Read the latest in Product Security thought leadership

fs-background-texture-02-1 (blog)
Unpacking Compliance: What Due Diligence Looks Like Under the Connected Vehicle Rule
CVR Due Diligence: What OEMs Must Prove

Unpacking Compliance: What Due Diligence Looks Like Under the Connected Vehicle Rule

Sep 17, 2025 4:47:32 PM 5 min read
Understanding the Connected Vehicle Rule: What OEMs and Suppliers Need to Know
Understanding the Connected Vehicle Rule: What OEMs and Suppliers Need to Know

Understanding the Connected Vehicle Rule: What OEMs and Suppliers Need to Know

Sep 17, 2025 4:16:50 PM 4 min read
The Risk of Connectivity: Every New Feature Expands the Attack Surface
The Risk of Connectivity: Every New Feature Expands the Attack Surface

The Risk of Connectivity: Every New Feature Expands the Attack Surface

Sep 17, 2025 3:58:58 PM 2 min read
The Hidden Costs of Neglecting Security Early in IoT Design
The Hidden Costs of Neglecting Security Early in IoT Design

The Hidden Costs of Neglecting Security Early in IoT Design

Sep 16, 2025 6:33:59 PM 2 min read
Why IoT Security Is Harder Than IT Security
Why IoT Security Is Harder Than IT Security

Why IoT Security Is Harder Than IT Security

Sep 16, 2025 5:43:14 PM 3 min read
Introducing Auto-Resolve: One-Click Resolution for Unreachable Findings
Introducing Auto-Resolve: One-Click Resolution for Unreachable Findings

Introducing Auto-Resolve: One-Click Resolution for Unreachable Findings

Jul 31, 2025 1:30:00 PM 1 min read
EU CRA Compliance: Essential Guide for UK IoT and Connected Product Makers
What the EU CRA Means for UK Connected Device Manufacturers

EU CRA Compliance: Essential Guide for UK IoT and Connected Product Makers

Jul 10, 2025 4:48:35 PM 6 min read
From Default Passwords to Default Deny: Implementing Security by Default in IoT
From Default Passwords to Default Deny: Implementing Security by Default in IoT

From Default Passwords to Default Deny: Implementing Security by Default in IoT

Jul 9, 2025 7:25:14 PM 2 min read
Security by Demand: Why Enterprises Are Now Asking for Proof
Security by Demand: Why Enterprises Are Now Asking for Proof

Security by Demand: Why Enterprises Are Now Asking for Proof

Jul 9, 2025 6:29:26 PM 2 min read
How to Deal with Opaque Vendors: Securing Components Without Source Code Access
Opaque Vendors: How to Secure Components Without Source Code Access

How to Deal with Opaque Vendors: Securing Components Without Source Code Access

Jul 4, 2025 5:44:18 PM 8 min read
UK Cybersecurity Regulations 2025–2030: What Manufacturers Need to Know and How to Prepare
Upcoming Changes to UK Cybersecurity Regulations: 2025–2030

UK Cybersecurity Regulations 2025–2030: What Manufacturers Need to Know and How to Prepare

Jul 4, 2025 3:12:56 PM 4 min read
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Jul 3, 2025 9:30:00 AM 3 min read
The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them
The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them

The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them

Jul 2, 2025 10:45:00 AM 2 min read
Introducing Reachability Analysis: Precision Risk Reduction for Efficient Remediation
Introducing Reachability Analysis: Precision Risk Reduction for Efficient Remediation

Introducing Reachability Analysis: Precision Risk Reduction for Efficient Remediation

Jun 30, 2025 9:30:00 AM 1 min read
Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk
Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk

Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk

Jun 26, 2025 6:30:37 PM 2 min read