Finite State Team

Posts by Finite State Team

Exploring Standards and Regulations for Automotive Cybersecurity
Exploring Standards and Regulations for Automotive Cybersecurity

Exploring Standards and Regulations for Automotive Cybersecurity

Aug 3, 2023 3:33:36 PM 4 min read
MergeBase Vs Sonatype
MergeBase Vs Sonatype: SCA tools compared

MergeBase Vs Sonatype

Jul 20, 2023 9:15:00 AM 6 min read
Embracing FDA 524B: Transforming the Cybersecurity Landscape for Medical Devices
Embracing FDA 524B: Transforming the Cybersecurity Landscape for Medical Devices

Embracing FDA 524B: Transforming the Cybersecurity Landscape for Medical Devices

Jul 10, 2023 4:31:25 PM 2 min read
6 Predictions for the Future of SBOM & Software Supply Chain Security
The future of SBOMs and software supply chain security

6 Predictions for the Future of SBOM & Software Supply Chain Security

Feb 15, 2023 12:45:00 PM 8 min read
Bill C-26 & CCSPA: Addressing Supply Chain & Third-Party Risks
What you need to know about Bill C-26 and the CCSPA

Bill C-26 & CCSPA: Addressing Supply Chain & Third-Party Risks

Feb 1, 2023 9:15:00 AM 6 min read
How Do You Make IoT Pen Testing Easier?
How Do You Make IoT Pen Testing Easier?

How Do You Make IoT Pen Testing Easier?

Oct 5, 2022 1:47:36 PM 2 min read
Log4J Reunion Tour 2022
Log4j reunion tour 2022

Log4J Reunion Tour 2022

Aug 8, 2022 11:15:00 AM 4 min read
What's the Best Java Scanning Tool?
What Is the Best Java Scanning Tool? | Finite State

What's the Best Java Scanning Tool?

Aug 3, 2022 12:45:00 PM 7 min read
Incident Response: Instill Confidence in Your Connected Products
Incident-Response-Connected-Products

Incident Response: Instill Confidence in Your Connected Products

Jun 28, 2022 2:15:00 PM 3 min read
Top 6 Ways Product Security Affects Your Bottom Line
product-security-bottom-line

Top 6 Ways Product Security Affects Your Bottom Line

Mar 30, 2022 10:36:25 AM 4 min read
What Is Product Security?
product-security

What Is Product Security?

Mar 9, 2022 2:10:31 PM 3 min read
Managing Open Source Risk with Device Composition Analysis for Connected Devices

Managing Open Source Risk with Device Composition Analysis for Connected Devices

Mar 8, 2022 10:45:00 AM 2 min read
Log4j in Your Embedded Products? Find It Before Attackers Do

Log4j in Your Embedded Products? Find It Before Attackers Do

Dec 16, 2021 12:32:39 PM 2 min read