Skip links

Explore our resources

Vulnerable, Targeted, and Exploited IoT Devices: Take the Necessary Steps to Discover Assets and Remediate the Risk
Videos
Vulnerable, Targeted, and Exploited IoT Devices: Take the Necessary Steps to Discover Assets and Remediate the Risk
In this interview, Brian Contos, Chief Security Officer for Phosphorous Cybersecurity, presents insights and examines the risks to IoT, OT, and network devices and the issues they can cause to an organization's overall IT infrastructure.
What Every CISO Needs To Know About Crisis Management
Videos
What Every CISO Needs To Know About Crisis Management
As world events have demonstrated these past couple of years, crisis management is a requisite for doing business in today’s…
The Convergence of OT Security with IT Security featuring Rock Lambros
Videos
The Convergence of OT Security with IT Security
Operational Technology (OT) and Information Technology (IT) have historically been managed by separate teams. But with cyberattacks targeting IoT devices…
Case Studies, Videos

Testimonial: ClearSky

“When I first saw Blue Lava and what they had built, I was absolutely wowed!”
Case Studies, Videos

Testimonial: Rapid Deploy

“We’ve gotten the best return on investment from Blue Lava out of every security tool that we’ve bought.”
Videos

About Blue Lava

Transform the way you manage the business of security with Blue Lava