If you think your software is secure, get ready to prove it.
![](https://finitestate.io/hubfs/Imported_Blog_Media/executive-order-cybersecurity-01-01.png)
If you think your software is secure, get ready to prove it.
May 13, 2021 12:56:49 PM
6
min read
Five New Challenges Facing Connected Device Manufacturers
![](https://finitestate.io/hubfs/Imported_Blog_Media/device-manufacturers-1.jpg)
Five New Challenges Facing Connected Device Manufacturers
Apr 19, 2021 7:59:54 AM
3
min read
Security Processes for Connected Devices – Revisiting AppSec
![](https://finitestate.io/hubfs/Imported_Blog_Media/security-processes-connected-devices.png)
Security Processes for Connected Devices – Revisiting AppSec
Mar 31, 2021 9:01:10 AM
3
min read
Provenance: What it Can and Can’t Tell Us About Connected Device Risk
![](https://finitestate.io/hubfs/Imported_Blog_Media/finite-state-global-1.png)
Provenance: What it Can and Can’t Tell Us About Connected Device Risk
Dec 29, 2020 10:11:34 AM
4
min read
SolarWinds SUNBURST: An Intrusion, Attack, or Act of War?
![](https://finitestate.io/hubfs/Imported_Blog_Media/Sunburst-FS-01.png)
SolarWinds SUNBURST: An Intrusion, Attack, or Act of War?
Dec 19, 2020 12:07:49 PM
5
min read
What you need to know about the IoT Cybersecurity Improvement Act (H.R.1668)
![](https://finitestate.io/hubfs/Imported_Blog_Media/government-scaled.jpg)
What you need to know about the IoT Cybersecurity Improvement Act (H.R.1668)
Nov 20, 2020 5:07:04 AM
3
min read
Key cybersecurity challenges for the energy sector—and how to address them
![](https://finitestate.io/hubfs/Imported_Blog_Media/AdobeStock_277021842-1024x530.png)
Key cybersecurity challenges for the energy sector—and how to address them
Nov 16, 2020 4:53:24 AM
5
min read
The Aftershock of Ripple20
![](https://finitestate.io/hubfs/Imported_Blog_Media/Ripple20-FS-1.jpg)
The Aftershock of Ripple20
Oct 12, 2020 10:40:15 AM
15
min read
Revealing True Product Risk: Where Third Party Risk Assessments Are Falling Short
![](https://finitestate.io/hubfs/Imported_Blog_Media/AdobeStock_142247694_Mono-scaled-e1601056583654.jpg)
Revealing True Product Risk: Where Third Party Risk Assessments Are Falling Short
Sep 24, 2020 5:11:51 AM
3
min read
IoMT Security: Protecting All Devices
![](https://finitestate.io/hubfs/Imported_Blog_Media/All-devices-02.png)
IoMT Security: Protecting All Devices
Nov 21, 2019 12:55:41 PM
2
min read
When Worlds Collide: How IoT Changes Cyber Risk
![](https://finitestate.io/hubfs/Imported_Blog_Media/OverlayFullWidthPromoBackground.jpg)
When Worlds Collide: How IoT Changes Cyber Risk
Oct 31, 2019 10:59:40 AM
1
min read
Industrial and Manufacturing Security with Finite State
![](https://finitestate.io/hubfs/Imported_Blog_Media/manufacturing_risk_iot.jpg)
Industrial and Manufacturing Security with Finite State
Sep 25, 2019 5:33:05 PM
1
min read
Finite State Research Team Finds Critical Vulnerability in WLAN Module of Philips Medical Devices
![](https://finitestate.io/hubfs/Imported_Blog_Media/FiniteStateSolutions.jpg)
Finite State Research Team Finds Critical Vulnerability in WLAN Module of Philips Medical Devices
Sep 12, 2019 12:52:53 PM
2
min read
The Unknown Knowns: Vulnerabilities Hiding In Your Devices
![](https://finitestate.io/hubfs/Imported_Blog_Media/finance_insurance-e1542651367869.jpg)
The Unknown Knowns: Vulnerabilities Hiding In Your Devices
Sep 5, 2019 10:13:06 AM
5
min read
Vulnerability or Backdoor? It Doesn’t Matter.
![](https://finitestate.io/hubfs/Imported_Blog_Media/gov_2-scaled.jpeg)
Vulnerability or Backdoor? It Doesn’t Matter.
Aug 5, 2019 3:19:46 PM
2
min read