Blog
The Finite State Blog

Practical insights and articles from our SMEs to help product security teams cut triage noise, fix what matters faster, and deliver audit-ready proof to customers and regulators.


57 results

How Reachability Analysis Transforms Vulnerability Management
Vulnerability ManagementProduct Security

How Reachability Analysis Transforms Vulnerability Management

Cut through vulnerability noise with reachability analysis that prioritizes exploitable risks, reduces false positives, and improves security decision...

Mike Hatherall
Mike HatherallNOVEMBER 10, 2025
How Remediation Testing Bridges the Security Gap
Product SecurityVulnerability Management

From Findings to Fixes: How Remediation Testing Bridges the Security Gap

Learn how remediation testing confirms your security fixes work, prevents regressions, and ensures compliance for connected device manufacturers.

Robert Kelley
Robert KelleyNOVEMBER 10, 2025
Finite State’s Take on CrowdStrike’s 2025 Global Threat Report
Vulnerability ManagementProduct Security

Finite State’s Take on CrowdStrike’s 2025 Global Threat Report

CrowdStrike’s 2025 report reveals rising IoT threats—identity abuse, exploit chains, cloud risk. See how Finite State helps secure connected products ...

Finite State Team
Finite State TeamSEPTEMBER 24, 2025
Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived
Vulnerability ManagementIoT & OT+1

Prioritize What’s Exploitable: Reachability Analysis For Connected Devices Has Arrived

Cut CVE noise and focus on what’s exploitable. Learn how Finite State’s Reachability Analysis revolutionizes IoT security and risk prioritization.

Finite State Team
Finite State TeamJULY 3, 2025
Top 5 Software Supply Chain Security Threats in 2025
Software Supply Chain SecurityVulnerability Management

Top 5 Software Supply Chain Security Threats in 2025

Learn how to mitigate the top 5 software supply chain threats in 2025—ransomware, CI/CD attacks, AI risks, IoT vulnerabilities, & legacy system exploi...

Larry Pesce
Larry PesceFEBRUARY 25, 2025
The Hidden Costs of Free Vulnerability Scanners
Vulnerability ManagementProduct Security+1

The Hidden Costs of Free Vulnerability Scanners

Discover the hidden costs of free SCA tools. Learn their pros, cons, and why investing in robust vulnerability scanners is critical for IoT security.

Hannah Beazley
Hannah BeazleyJANUARY 24, 2025
Overcoming Challenges in Vulnerability & Incident Management for EU CRA Compliance
Vulnerability ManagementCompliance & Regulations

Overcoming Challenges in Vulnerability & Incident Management for EU CRA Compliance

Discover effective solutions to the challenges IoT manufacturers face meeting EU CRA requirements for vulnerability management & incident response.

Hannah Beazley
Hannah BeazleyNOVEMBER 15, 2024
EU CRA's Vulnerability Handling & Incident Reporting Rules: A Guide
Vulnerability ManagementCompliance & Regulations

EU CRA's Vulnerability Handling & Incident Reporting Rules: A Guide

Navigate the EU Cyber Resilience Act's vulnerability handling & incident reporting requirements with part 2 of our guide for IoT manufacturers.

Hannah Beazley
Hannah BeazleyNOVEMBER 15, 2024
Four Signs It’s Time to Upgrade from The OWASP Dependency-Check
Vulnerability Management

Four Signs It’s Time to Upgrade from The OWASP Dependency-Check

Learn the four signs it's time to move from OWASP Dependency-Check to a premium SCA tool, & how to build a business case for upgrading to better secur...

Oscar van der Meer
Oscar van der MeerOCTOBER 4, 2024
Four Signs It’s Time to Upgrade from The OWASP Dependency-Check
Vulnerability Management

Four Signs It’s Time to Upgrade from The OWASP Dependency-Check

Learn the four signs it's time to move from OWASP Dependency-Check to a premium SCA tool, & how to build a business case for upgrading to better secur...

Oscar van der Meer
Oscar van der MeerOCTOBER 4, 2024
Four Signs It’s Time to Upgrade from The OWASP Dependency-Check
Vulnerability Management

Four Signs It’s Time to Upgrade from The OWASP Dependency-Check

Learn the four signs it's time to move from OWASP Dependency-Check to a premium SCA tool, & how to build a business case for upgrading to better secur...

Oscar van der Meer
Oscar van der MeerOCTOBER 4, 2024
Four Signs It’s Time to Upgrade from The OWASP Dependency-Check
Vulnerability Management

Four Signs It’s Time to Upgrade from The OWASP Dependency-Check

Learn the four signs it's time to move from OWASP Dependency-Check to a premium SCA tool, & how to build a business case for upgrading to better secur...

Oscar van der Meer
Oscar van der MeerOCTOBER 4, 2024
Finite StateFinite State

Finite State is the Product Security Automation Platform that functions as an autonomous Product Security OS: design → verify → prove, grounded in what you ship.

Platform

Platform Overview
Ground Truth Inventory
Exploitability-Based Prioritization
Design-Time Architecture Security
Automated Evidence-Backed Compliance

Solutions

Device Manufacturers
Automotive
Medical Devices
Energy & Utilities
Government
Industrial

Resources

Blog
Resource Library
Webinars & Videos
Events
Documentation

Company

About Us
CareersHIRING
Press & Media
Contact Sales
X

© 2026 Finite State. All rights reserved.

Privacy PolicyTerms of UseCustomer Terms and Conditions
Finite StateFinite State
Finite StateFinite State
LoginLogin