Finite State Team

Posts by Finite State Team

How One Global Manufacturer Cut Compliance Prep Time by 90% & Reduced Vulnerability Noise by 95%
95% Less Vulnerability Noise with Finite State

How One Global Manufacturer Cut Compliance Prep Time by 90% & Reduced Vulnerability Noise by 95%

Nov 25, 2025 1:31:11 PM 2 min read
The Human Element in Embedded Device Security: Insights from a Red Teamer
The Human Element in Embedded Device Security: Insights from a Red Teamer

The Human Element in Embedded Device Security: Insights from a Red Teamer

Nov 18, 2025 5:49:49 PM 2 min read
Korea Joins Global Leaders with Mandatory SBOM Submission: What It Means for Product Security
Korea Mandates SBOMs: What It Means for Product Security

Korea Joins Global Leaders with Mandatory SBOM Submission: What It Means for Product Security

Nov 7, 2025 5:40:56 PM 3 min read
The Road to Compliance: First Steps OEMs and Suppliers Should Take Today
Road to Compliance: First Steps OEMs and Suppliers Should Take Today

The Road to Compliance: First Steps OEMs and Suppliers Should Take Today

Oct 20, 2025 4:37:24 PM 4 min read
Legacy Software & CVR Compliance Carveouts Explained
Legacy Software & CVR Compliance Carveouts Explained

Legacy Software & CVR Compliance Carveouts Explained

Oct 16, 2025 1:51:09 PM 3 min read
Finite State’s Take on CrowdStrike’s 2025 Global Threat Report
Finite State’s Take on CrowdStrike’s 2025 Global Threat Report

Finite State’s Take on CrowdStrike’s 2025 Global Threat Report

Sep 24, 2025 2:41:32 PM 3 min read
Navigating Ambiguity: Interpreting Key Definitions in the Connected Vehicle Rule
Interpreting Key Definitions in the Connected Vehicle Rule

Navigating Ambiguity: Interpreting Key Definitions in the Connected Vehicle Rule

Sep 18, 2025 12:57:05 PM 5 min read
Unpacking Compliance: What Due Diligence Looks Like Under the Connected Vehicle Rule
CVR Due Diligence: What OEMs Must Prove

Unpacking Compliance: What Due Diligence Looks Like Under the Connected Vehicle Rule

Sep 17, 2025 4:47:32 PM 5 min read
Understanding the Connected Vehicle Rule: What OEMs and Suppliers Need to Know
Understanding the Connected Vehicle Rule: What OEMs and Suppliers Need to Know

Understanding the Connected Vehicle Rule: What OEMs and Suppliers Need to Know

Sep 17, 2025 4:16:50 PM 4 min read
From Default Passwords to Default Deny: Implementing Security by Default in IoT
From Default Passwords to Default Deny: Implementing Security by Default in IoT

From Default Passwords to Default Deny: Implementing Security by Default in IoT

Jul 9, 2025 7:25:14 PM 2 min read
Security by Demand: Why Enterprises Are Now Asking for Proof
Security by Demand: Why Enterprises Are Now Asking for Proof

Security by Demand: Why Enterprises Are Now Asking for Proof

Jul 9, 2025 6:29:26 PM 2 min read
UK Cybersecurity Regulations 2025–2030: What Manufacturers Need to Know and How to Prepare
Upcoming Changes to UK Cybersecurity Regulations: 2025–2030

UK Cybersecurity Regulations 2025–2030: What Manufacturers Need to Know and How to Prepare

Jul 4, 2025 3:12:56 PM 4 min read
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Jul 3, 2025 9:30:00 AM 3 min read
Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk
Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk

Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk

Jun 26, 2025 6:30:37 PM 2 min read
Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance
Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance

Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance

May 29, 2025 1:47:36 PM 6 min read