Read the latest in Product Security thought leadership

fs-background-texture-02-1 (blog)
The Open Source Trojan Horse — Hidden Risk in Reused Code
OSS Trojan Horse: The Hidden Risks of Open Source in Embedded Systems

The Open Source Trojan Horse — Hidden Risk in Reused Code

Jun 2, 2025 10:45:01 AM 1 min read
Think Your Source Code Is Secure? Check Your Firmware
Think Your Source Code Is Secure? Check Your Firmware First

Think Your Source Code Is Secure? Check Your Firmware

Jun 2, 2025 10:30:00 AM 2 min read
Shellfish, SBOMs, and Firmware: A Security Tale You Won’t Forget
You Can’t Secure What You Can’t See: Is Your Scanner Blindfolded?

Shellfish, SBOMs, and Firmware: A Security Tale You Won’t Forget

May 30, 2025 1:30:32 PM 2 min read
Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance
Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance

Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance

May 29, 2025 1:47:36 PM 6 min read
For Connected Devices, Audit Readiness Is a Legal Strategy — Here’s How to Get It Right
For Connected Devices, Audit Readiness Is a Legal Strategy — Here’s How to Get It Right

For Connected Devices, Audit Readiness Is a Legal Strategy — Here’s How to Get It Right

May 27, 2025 6:28:44 PM 2 min read
How CRA Compliance Can Become a Competitive Advantage for IoT Leaders
How To Make CRA Compliance a Competitive Advantage for IoT Leaders

How CRA Compliance Can Become a Competitive Advantage for IoT Leaders

May 27, 2025 5:39:43 PM 2 min read
Getting Audit-Ready with Finite State: A CISO’s Guide to Regulatory Compliance
Audit-Ready with Finite State: A CISO’s Guide to Regulatory Compliance

Getting Audit-Ready with Finite State: A CISO’s Guide to Regulatory Compliance

May 27, 2025 1:10:34 PM 5 min read
Five Signs Your Product Security Program Has Outgrown Its Current Tools
5 Signs Your Product Security Program Has Outgrown Its Current Tools

Five Signs Your Product Security Program Has Outgrown Its Current Tools

May 19, 2025 6:56:27 PM 2 min read
Navigating the UK PSTI Act: What Global Device Manufacturers Need to Know
UK PSTI Act: What Global Device Manufacturers Need to Know

Navigating the UK PSTI Act: What Global Device Manufacturers Need to Know

May 19, 2025 11:48:15 AM 3 min read
The Real Cost of Immature Product Security Programs
The Real Costs of Immature Product Security Programs

The Real Cost of Immature Product Security Programs

May 15, 2025 2:01:36 PM 3 min read
CI/CD, DevSecOps, and the Road to Security Maturity
CI/CD, DevSecOps, and the Road to Product Security Maturity

CI/CD, DevSecOps, and the Road to Security Maturity

May 15, 2025 12:34:56 PM 4 min read
From Security Debt to Compliance Debt: Why IoT Product Teams Can’t Afford to Wait on the CRA
From Security Debt to Compliance Debt: Why IoT Product Teams Can’t Afford to Wait on the CRA

From Security Debt to Compliance Debt: Why IoT Product Teams Can’t Afford to Wait on the CRA

May 8, 2025 5:18:53 PM 2 min read
Bridging the Security Gap in Connected Products: Key Takeaways from Our Webinar with Beecham Research and Aeris
Bridging the Security Gap in Connected Products

Bridging the Security Gap in Connected Products: Key Takeaways from Our Webinar with Beecham Research and Aeris

May 8, 2025 4:55:45 PM 2 min read
Beyond Automation: Why Deep Binary Analysis is Critical for IoT Security Success
Beyond Automation: Why Deep Binary Analysis is Critical for IoT Security Success

Beyond Automation: Why Deep Binary Analysis is Critical for IoT Security Success

May 7, 2025 2:23:12 PM 2 min read
From Third-Party Mayhem to Strategic Assurance: How Finite State Arms You Against the Threats in Verizon’s 2025 DBIR
How Finite State Arms You Against the Threats in Verizon’s 2025 DBIR

From Third-Party Mayhem to Strategic Assurance: How Finite State Arms You Against the Threats in Verizon’s 2025 DBIR

May 6, 2025 5:43:12 PM 3 min read