Read the latest in Product Security thought leadership

fs-background-texture-02-1 (blog)
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Jul 3, 2025 9:30:00 AM 3 min read
The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them
The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them

The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them

Jul 2, 2025 10:45:00 AM 2 min read
Introducing Reachability Analysis: Precision Risk Reduction for Efficient Remediation
Introducing Reachability Analysis: Precision Risk Reduction for Efficient Remediation

Introducing Reachability Analysis: Precision Risk Reduction for Efficient Remediation

Jun 30, 2025 9:30:00 AM 1 min read
Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk
Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk

Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk

Jun 26, 2025 6:30:37 PM 2 min read
Software Supply Chain Security Metrics: What to Measure & Why
Software Supply Chain Security Metrics: What to Measure & Why

Software Supply Chain Security Metrics: What to Measure & Why

Jun 26, 2025 6:11:43 PM 3 min read
Why an SBOM Alone Isn’t Enough for Compliance
The Compliance Gap: When SBOMs Aren’t Enough

Why an SBOM Alone Isn’t Enough for Compliance

Jun 5, 2025 12:15:01 PM 2 min read
From CRA to FDA 524B: How Secure Development Frameworks Unite Global Compliance
CRA to FDA: How Secure Development Frameworks Unite Global Compliance

From CRA to FDA 524B: How Secure Development Frameworks Unite Global Compliance

Jun 4, 2025 11:30:00 AM 3 min read
What CISOs Need to Know About Product Security Maturity
What CISOs Need to Know About Product Security Maturity for IoT

What CISOs Need to Know About Product Security Maturity

Jun 2, 2025 2:05:44 PM 3 min read
Building a Compliance-Ready DevSecOps Pipeline for IoT & Embedded Systems
Building a Compliance-Ready DevSecOps Pipeline for IoT Systems

Building a Compliance-Ready DevSecOps Pipeline for IoT & Embedded Systems

Jun 2, 2025 1:17:39 PM 2 min read
Building a Modern IoT Security Stack: From Source to Firmware
Building a Modern IoT Security Stack: Securing From Source to Firmware

Building a Modern IoT Security Stack: From Source to Firmware

Jun 2, 2025 11:00:00 AM 1 min read
The Open Source Trojan Horse — Hidden Risk in Reused Code
OSS Trojan Horse: The Hidden Risks of Open Source in Embedded Systems

The Open Source Trojan Horse — Hidden Risk in Reused Code

Jun 2, 2025 10:45:01 AM 1 min read
Think Your Source Code Is Secure? Check Your Firmware
Think Your Source Code Is Secure? Check Your Firmware First

Think Your Source Code Is Secure? Check Your Firmware

Jun 2, 2025 10:30:00 AM 2 min read
Shellfish, SBOMs, and Firmware: A Security Tale You Won’t Forget
You Can’t Secure What You Can’t See: Is Your Scanner Blindfolded?

Shellfish, SBOMs, and Firmware: A Security Tale You Won’t Forget

May 30, 2025 1:30:32 PM 2 min read
Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance
Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance

Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance

May 29, 2025 1:47:36 PM 6 min read
For Connected Devices, Audit Readiness Is a Legal Strategy — Here’s How to Get It Right
For Connected Devices, Audit Readiness Is a Legal Strategy — Here’s How to Get It Right

For Connected Devices, Audit Readiness Is a Legal Strategy — Here’s How to Get It Right

May 27, 2025 6:28:44 PM 2 min read