Resources
Resource Library

Guides, data sheets, and how-tos for helping product security teams reduce noise, accelerate remediation, and prove security posture to customers and regulators.


7 results

Rough Around the Edges: The State of OT/IoT Routers in the Software Supply Chain
Report

Rough Around the Edges: The State of OT/IoT Routers in the Software Supply Chain

A joint Forescout Research and Finite State analysis revealing widespread use of outdated open-source components, critical vulnerabilities, and weak s...

Aug 6, 2024
Supply chain transparency, risk management, and compliance for the auto sector
Datasheet

Supply chain transparency, risk management, and compliance for the auto sector

To understand the impact of supply chain security, the Ponemon Institute conducted a survey of 632 embedded product security decision makers.

Feb 27, 2024
Joint Webinar with Microsoft: Scaling Software Supply Chain Security with the OpenSSF S2C2F OSS Specification
Webinar

Joint Webinar with Microsoft: Scaling Software Supply Chain Security with the OpenSSF S2C2F OSS Specification

Safeguard your software supply chain from rising vulnerabilities. Learn to mitigate risks like Log4j and SolarWinds now.

Sep 11, 2023
Unpacking CVSS 4.0: Exploring Enhanced Vulnerability Scoring
Video

Unpacking CVSS 4.0: Exploring Enhanced Vulnerability Scoring

Discover the transformative impact of CVSS 4.0 on vulnerability measurement and risk management in Larry Pesce's insightful CS4CA presentation.

Jul 11, 2023
The Importance of Securing Connected and Embedded Devices in the Supply Chain (Ponemon Institute)
Report

The Importance of Securing Connected and Embedded Devices in the Supply Chain (Ponemon Institute)

To understand the impact of supply chain security, the Ponemon Institute conducted a survey of 632 embedded product security decision makers.

Oct 8, 2021
False Alarms and Close Calls: The Analysis and Verification of Ripple20 and its Ripple Effect
Report

False Alarms and Close Calls: The Analysis and Verification of Ripple20 and its Ripple Effect

Finite State research reveals that Ripple20 Vulnerabilities may not affect devices the way we originally thought.

May 26, 2021
Huawei Supply Chain Assessment
Report

Huawei Supply Chain Assessment

Finite State examines the supply chains for Huawei 5G network products. See our detailed report of what we found and what methods we used.

May 26, 2021
Finite StateFinite State

Finite State is the Product Security Automation Platform that functions as an autonomous Product Security OS: design → verify → prove, grounded in what you ship.

Platform

Platform Overview
Ground Truth Inventory
Exploitability-Based Prioritization
Design-Time Architecture Security
Automated Evidence-Backed Compliance

Solutions

Device Manufacturers
Automotive
Medical Devices
Energy & Utilities
Government
Industrial

Resources

Blog
Resource Library
Webinars & Videos
Events
Documentation

Company

About Us
CareersHIRING
Press & Media
Contact Sales
X

© 2026 Finite State. All rights reserved.

Privacy PolicyTerms of UseCustomer Terms and Conditions
Finite StateFinite State
Finite StateFinite State
LoginLogin