How to Identify Vulnerabilities in Open Source Code
How to Identify Vulnerabilities in Open Source Code

How to Identify Vulnerabilities in Open Source Code

Jul 30, 2024 9:00:00 AM 3 min read
The Comprehensive Guide to FDA Medical Device Regulations
An In-Depth Guide to FDA Medical Device Regulations

The Comprehensive Guide to FDA Medical Device Regulations

Jul 26, 2024 12:36:06 PM 6 min read
Understanding Social Engineering & Insider Threats in Java Security
Understanding social engineering and insider threats in java security

Understanding Social Engineering & Insider Threats in Java Security

Jul 23, 2024 5:50:00 PM 5 min read
Navigating the EU Cyber Resilience Act: Essential Insights for Product Security Teams
Navigating the EU CRA: Essential Insights for Product Security Teams

Navigating the EU Cyber Resilience Act: Essential Insights for Product Security Teams

Jul 19, 2024 9:00:00 AM 4 min read
The Complete Guide to Open Source Licenses
The Complete Guide to Open Source Licenses

The Complete Guide to Open Source Licenses

Jul 18, 2024 11:28:43 AM 6 min read
New Enhanced Dependency Capabilities!
Finite State feature announcement: enhanced dependency capabilities

New Enhanced Dependency Capabilities!

Jul 16, 2024 11:15:00 AM 4 min read
Secure Your Software Supply Chain: The Finite State Buyer's Guide for Product Security Solutions
Securing Software Supply Chains: A Guide to Product Security Solutions

Secure Your Software Supply Chain: The Finite State Buyer's Guide for Product Security Solutions

Jul 15, 2024 11:45:00 AM 3 min read
How to Find a Product Security Solution for Your Software Supply Chain
How to Find a Product Security Solution for Your Software Supply Chain

How to Find a Product Security Solution for Your Software Supply Chain

Jul 11, 2024 1:07:00 PM 6 min read
A Look at the UN R155 Regulation for Connected Vehicles
A Look at the UN R155 Regulation for Connected Vehicles

A Look at the UN R155 Regulation for Connected Vehicles

Jul 9, 2024 9:43:23 AM 4 min read
Six Things to Consider When Evaluating Software Security Solutions
6 Things to Consider When Evaluating Software Security Solutions

Six Things to Consider When Evaluating Software Security Solutions

Jul 3, 2024 10:18:29 AM 2 min read
MergeBase’s Bob Lyle Presents at GSMA FASG #29, Istanbul
MergeBase’s Bob Lyle Presents at GSMA FASG #29, Istanbul

MergeBase’s Bob Lyle Presents at GSMA FASG #29, Istanbul

Jul 2, 2024 11:32:49 AM 2 min read
Upgrade Problems with Open Source Software Vulnerabilities
The

Upgrade Problems with Open Source Software Vulnerabilities

Jul 1, 2024 1:00:00 PM 6 min read
Finite State Acquires MergeBase to Form a Powerhouse in Application Security
Finite State Acquires MergeBase to Form a Powerhouse in Application Security

Finite State Acquires MergeBase to Form a Powerhouse in Application Security

Jun 27, 2024 9:39:42 AM 3 min read
CISA's Secure Software Development Attestation Form: How SBOMs and Connected Device Security Can Help
SBOMs, Connected Device Security & CISA's Secure Software Attestation

CISA's Secure Software Development Attestation Form: How SBOMs and Connected Device Security Can Help

Jun 18, 2024 4:06:32 PM 4 min read
Strengthening IoT Security Through Secure by Design Principles
How Secure by Design Principles Strengthen IoT Security

Strengthening IoT Security Through Secure by Design Principles

Jun 14, 2024 12:06:25 PM 4 min read