Finite State Blog

Product Security

Security Services That Scale: How Finite State Helps You Stay Ahead of Threats and Regulations
How to Scale Product Security Across Embedded Systems

Security Services That Scale: How Finite State Helps You Stay Ahead of Threats and Regulations

Nov 18, 2025 5:04:36 PM 2 min read
Security by Design/by Default Isn’t Optional Anymore: How Embedded Device Teams Can Get Ahead
How Embedded Device Teams Can Get Ahead of Security by Design Mandates

Security by Design/by Default Isn’t Optional Anymore: How Embedded Device Teams Can Get Ahead

Nov 18, 2025 1:20:51 PM 2 min read
One Shared Language: Why Defining Your Data Model Is the Key to Product Security
Why Defining Your Data Model Is the Key to Product Security

One Shared Language: Why Defining Your Data Model Is the Key to Product Security

Nov 17, 2025 4:11:18 PM 2 min read
The Truth About False Positives in Embedded Security and How to Eliminate Them
False Positives in Embedded Security and How to Eliminate Them

The Truth About False Positives in Embedded Security and How to Eliminate Them

Nov 14, 2025 5:08:29 PM 2 min read
Cutting Through the Noise: How Reachability Analysis Transforms Vulnerability Management
How Reachability Analysis Transforms Vulnerability Management

Cutting Through the Noise: How Reachability Analysis Transforms Vulnerability Management

Nov 14, 2025 4:41:55 PM 2 min read
From Findings to Fixes: How Remediation Testing Bridges the Security Gap
How Remediation Testing Bridges the Security Gap

From Findings to Fixes: How Remediation Testing Bridges the Security Gap

Nov 10, 2025 1:05:29 PM 2 min read
The Cost of Siloed Security: Why Spreadsheets Are No Longer Enough
The Cost of Siloed Security: Why Spreadsheets Are No Longer Enough

The Cost of Siloed Security: Why Spreadsheets Are No Longer Enough

Oct 27, 2025 3:40:47 PM 3 min read
One Platform, One Risk Picture: The Key to Unifying SBOM, Vulnerability, and Compliance Workflows
Finite State - Unifying SBOM, Vulnerability, and Compliance Workflows

One Platform, One Risk Picture: The Key to Unifying SBOM, Vulnerability, and Compliance Workflows

Oct 27, 2025 2:47:14 PM 3 min read
Finite State’s Take on CrowdStrike’s 2025 Global Threat Report
Finite State’s Take on CrowdStrike’s 2025 Global Threat Report

Finite State’s Take on CrowdStrike’s 2025 Global Threat Report

Sep 24, 2025 2:41:32 PM 3 min read
Security by Demand: Why Enterprises Are Now Asking for Proof
Security by Demand: Why Enterprises Are Now Asking for Proof

Security by Demand: Why Enterprises Are Now Asking for Proof

Jul 9, 2025 6:29:26 PM 2 min read
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Jul 3, 2025 9:30:00 AM 3 min read
The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them
The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them

The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them

Jul 2, 2025 10:45:00 AM 2 min read
Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk
Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk

Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk

Jun 26, 2025 6:30:37 PM 2 min read
What CISOs Need to Know About Product Security Maturity
What CISOs Need to Know About Product Security Maturity for IoT

What CISOs Need to Know About Product Security Maturity

Jun 2, 2025 2:05:44 PM 3 min read
Building a Modern IoT Security Stack: From Source to Firmware
Building a Modern IoT Security Stack: Securing From Source to Firmware

Building a Modern IoT Security Stack: From Source to Firmware

Jun 2, 2025 11:00:00 AM 1 min read