Finite State Blog

IoT & OT

The Risk of Connectivity: Every New Feature Expands the Attack Surface
The Risk of Connectivity: Every New Feature Expands the Attack Surface

The Risk of Connectivity: Every New Feature Expands the Attack Surface

Sep 17, 2025 3:58:58 PM 2 min read
The Hidden Costs of Neglecting Security Early in IoT Design
The Hidden Costs of Neglecting Security Early in IoT Design

The Hidden Costs of Neglecting Security Early in IoT Design

Sep 16, 2025 6:33:59 PM 2 min read
Why IoT Security Is Harder Than IT Security
Why IoT Security Is Harder Than IT Security

Why IoT Security Is Harder Than IT Security

Sep 16, 2025 5:43:14 PM 3 min read
From Default Passwords to Default Deny: Implementing Security by Default in IoT
From Default Passwords to Default Deny: Implementing Security by Default in IoT

From Default Passwords to Default Deny: Implementing Security by Default in IoT

Jul 9, 2025 7:25:14 PM 2 min read
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Jul 3, 2025 9:30:00 AM 3 min read
Building a Compliance-Ready DevSecOps Pipeline for IoT & Embedded Systems
Building a Compliance-Ready DevSecOps Pipeline for IoT Systems

Building a Compliance-Ready DevSecOps Pipeline for IoT & Embedded Systems

Jun 2, 2025 1:17:39 PM 2 min read
Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance
Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance

Finite State vs. Mend.io: Choosing the Right Tool for Product Security and Compliance

May 29, 2025 1:47:36 PM 6 min read
From Security Debt to Compliance Debt: Why IoT Product Teams Can’t Afford to Wait on the CRA
From Security Debt to Compliance Debt: Why IoT Product Teams Can’t Afford to Wait on the CRA

From Security Debt to Compliance Debt: Why IoT Product Teams Can’t Afford to Wait on the CRA

May 8, 2025 5:18:53 PM 2 min read
Bridging the Security Gap in Connected Products: Key Takeaways from Our Webinar with Beecham Research and Aeris
Bridging the Security Gap in Connected Products

Bridging the Security Gap in Connected Products: Key Takeaways from Our Webinar with Beecham Research and Aeris

May 8, 2025 4:55:45 PM 2 min read
How to Overcome Security Challenges in IoT Devices
How to Overcome Common Security Challenges in IoT Devices

How to Overcome Security Challenges in IoT Devices

May 2, 2025 1:56:10 PM 4 min read
How IoT Security Challenges Impact Regulatory Compliance
How IoT Security Challenges Impact Regulatory Compliance

How IoT Security Challenges Impact Regulatory Compliance

May 2, 2025 1:24:27 PM 3 min read
Unique Security Challenges of Connected Devices
Unique Security Challenges of Connected Devices

Unique Security Challenges of Connected Devices

May 2, 2025 1:08:12 PM 4 min read
Managing Open-Source Dependencies in IoT Software: Best Practices
Managing Open-Source Dependencies in IoT Software: Best Practices

Managing Open-Source Dependencies in IoT Software: Best Practices

Apr 9, 2025 6:43:15 AM 4 min read
The Business Case for IoT Security: Beecham Research Highlights the Growing Risks & Opportunities
Beecham research report

The Business Case for IoT Security: Beecham Research Highlights the Growing Risks & Opportunities

Feb 28, 2025 1:57:12 PM 1 min read
Understanding Secure by Design: An EU CRA Guide for IoT Manufacturers
understanding security by design blog header image

Understanding Secure by Design: An EU CRA Guide for IoT Manufacturers

Jan 28, 2025 6:30:10 PM 5 min read