Finite State Blog

Product Security

Security by Demand: Why Enterprises Are Now Asking for Proof
Security by Demand: Why Enterprises Are Now Asking for Proof

Security by Demand: Why Enterprises Are Now Asking for Proof

Jul 9, 2025 6:29:26 PM 2 min read
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Jul 3, 2025 9:30:00 AM 3 min read
The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them
The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them

The Hidden Costs of Post-Deployment Security Fixes and How to Avoid Them

Jul 2, 2025 10:45:00 AM 2 min read
Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk
Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk

Security by Design, Default, and Demand: Building Resilient IoT Products in an Era of Escalating Risk

Jun 26, 2025 6:30:37 PM 2 min read
What CISOs Need to Know About Product Security Maturity
What CISOs Need to Know About Product Security Maturity for IoT

What CISOs Need to Know About Product Security Maturity

Jun 2, 2025 2:05:44 PM 3 min read
Building a Modern IoT Security Stack: From Source to Firmware
Building a Modern IoT Security Stack: Securing From Source to Firmware

Building a Modern IoT Security Stack: From Source to Firmware

Jun 2, 2025 11:00:00 AM 1 min read
The Open Source Trojan Horse — Hidden Risk in Reused Code
OSS Trojan Horse: The Hidden Risks of Open Source in Embedded Systems

The Open Source Trojan Horse — Hidden Risk in Reused Code

Jun 2, 2025 10:45:01 AM 1 min read
Think Your Source Code Is Secure? Check Your Firmware
Think Your Source Code Is Secure? Check Your Firmware First

Think Your Source Code Is Secure? Check Your Firmware

Jun 2, 2025 10:30:00 AM 2 min read
Five Signs Your Product Security Program Has Outgrown Its Current Tools
5 Signs Your Product Security Program Has Outgrown Its Current Tools

Five Signs Your Product Security Program Has Outgrown Its Current Tools

May 19, 2025 6:56:27 PM 2 min read
The Real Cost of Immature Product Security Programs
The Real Costs of Immature Product Security Programs

The Real Cost of Immature Product Security Programs

May 15, 2025 2:01:36 PM 3 min read
CI/CD, DevSecOps, and the Road to Security Maturity
CI/CD, DevSecOps, and the Road to Product Security Maturity

CI/CD, DevSecOps, and the Road to Security Maturity

May 15, 2025 12:34:56 PM 4 min read
Bridging the Security Gap in Connected Products: Key Takeaways from Our Webinar with Beecham Research and Aeris
Bridging the Security Gap in Connected Products

Bridging the Security Gap in Connected Products: Key Takeaways from Our Webinar with Beecham Research and Aeris

May 8, 2025 4:55:45 PM 2 min read
Beyond Automation: Why Deep Binary Analysis is Critical for IoT Security Success
Beyond Automation: Why Deep Binary Analysis is Critical for IoT Security Success

Beyond Automation: Why Deep Binary Analysis is Critical for IoT Security Success

May 7, 2025 2:23:12 PM 2 min read
From Third-Party Mayhem to Strategic Assurance: How Finite State Arms You Against the Threats in Verizon’s 2025 DBIR
How Finite State Arms You Against the Threats in Verizon’s 2025 DBIR

From Third-Party Mayhem to Strategic Assurance: How Finite State Arms You Against the Threats in Verizon’s 2025 DBIR

May 6, 2025 5:43:12 PM 3 min read
The 2025 Verizon Data Breach Investigations Report: What It Means for Product and Supply Chain Security
The 2025 Verizon Data Breach Investigations Report: What It Means for Product and Supply Chain Security

The 2025 Verizon Data Breach Investigations Report: What It Means for Product and Supply Chain Security

May 6, 2025 4:50:32 PM 2 min read