<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://finitestate.io</loc>
<lastmod>2026-03-17T16:46:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog</loc>
<lastmod>2026-02-24T22:41:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources</loc>
<lastmod>2026-02-18T00:15:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos</loc>
<lastmod>2026-02-19T22:12:20.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events</loc>
<lastmod>2026-03-20T17:28:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/podcasts</loc>
</url>
<url>
<loc>https://finitestate.io/news</loc>
<lastmod>2026-02-27T19:09:21.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/careers</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-security-regulations-compliance</loc>
<lastmod>2026-02-19T22:02:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/beyond-sboms-deep-binary-analysis</loc>
<lastmod>2026-02-19T22:02:26.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-iot-security-is-harder-than-it-security</loc>
<lastmod>2026-02-19T22:02:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/unified-risk-view-for-compliance</loc>
<lastmod>2026-02-19T22:02:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cvr-legacy-software-authorizations</loc>
<lastmod>2026-02-19T22:02:30.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-security-design-mistakes</loc>
<lastmod>2026-02-19T22:02:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/auto-resolve-feature-release</loc>
<lastmod>2026-02-19T22:02:32.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/global-manufacturer-compliance-transformation-case-study</loc>
<lastmod>2026-02-19T22:02:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-penetration-testing-frequency</loc>
<lastmod>2026-02-19T22:02:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/product-security-data-model</loc>
<lastmod>2026-02-19T22:02:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/a-unified-path-to-cra-compliance</loc>
<lastmod>2026-02-24T20:23:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/understanding-the-connected-vehicle-rule</loc>
<lastmod>2026-02-19T22:02:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-cloud-security-risks</loc>
<lastmod>2026-02-19T22:02:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/human-element-embedded-security</loc>
<lastmod>2026-02-19T22:02:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/firmware-security-black-box-analysis</loc>
<lastmod>2026-02-19T22:02:42.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/connected-vehicle-rule-due-diligence</loc>
<lastmod>2026-02-19T22:02:43.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cra-readiness-mistakes-to-avoid</loc>
<lastmod>2026-02-19T22:02:45.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-connectivity-attack-surface</loc>
<lastmod>2026-02-19T22:02:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cra-vulnerability-disclosure-program</loc>
<lastmod>2026-02-19T22:02:47.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/expanded-reachability-impact</loc>
<lastmod>2026-02-19T22:02:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/finite-state-boosts-reachability-speed-and-coverage</loc>
<lastmod>2026-02-19T22:02:50.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/quick-start-cra-readiness-tips</loc>
<lastmod>2026-02-19T22:02:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/finite-state-expands-autosar-module-detection</loc>
<lastmod>2026-02-19T22:02:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/connected-vehicle-rule-compliance-steps</loc>
<lastmod>2026-02-19T22:02:53.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/security-services-for-device-manufacturers</loc>
<lastmod>2026-02-19T22:02:54.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/get-ahead-with-secure-by-design</loc>
<lastmod>2026-02-19T22:02:56.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/remediation-testing-validate-security-fixes</loc>
<lastmod>2026-02-19T22:02:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/enhanced-dashboards-software-supply-chain-risk</loc>
<lastmod>2026-02-19T22:02:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/connected-vehicle-rule-definitions</loc>
<lastmod>2026-02-19T22:02:59.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/reachability-analysis-cra-vulnerability-prioritization</loc>
<lastmod>2026-02-19T22:03:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cra-multi-modal-scanning-product-portfolio</loc>
<lastmod>2026-02-19T22:03:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/ai-unpacking-evaluation-agent</loc>
<lastmod>2026-02-24T22:41:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-reachability-analysis-transforms-vulnerability-management</loc>
<lastmod>2026-02-19T22:03:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/siloed-security-vs-unified-platform</loc>
<lastmod>2026-02-19T22:03:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/unify-sbom-vulnerability-compliance</loc>
<lastmod>2026-02-19T22:03:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/korea-mandatory-sbom-policy-product-security</loc>
<lastmod>2026-02-19T22:03:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/living-sboms-for-compliance</loc>
<lastmod>2026-02-19T22:03:11.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/embedded-pen-testing-limitations</loc>
<lastmod>2026-02-19T22:03:12.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/crowdstrike-global-threat-report-iot-insights</loc>
<lastmod>2026-02-19T22:03:13.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/enterprise-guide-appsec-tech-stack-consolidation</loc>
<lastmod>2026-02-19T22:03:15.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/colorado-privacy-act</loc>
<lastmod>2026-02-19T22:03:16.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/does-the-governments-cybersecurity-mouth-have-any-teeth-in-it-with-mariam-baksh-staff-correspondent-at-nextgov</loc>
<lastmod>2026-02-19T22:03:17.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/top-12-iot-exploits-of-2021-p1</loc>
<lastmod>2026-02-19T22:03:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-keeps-an-industrial-cybersecurity-expert-up-at-night-with-jonathan-tubb-of-siemens-energy</loc>
<lastmod>2026-02-19T22:03:19.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iso-21434-how-does-finite-state-help</loc>
<lastmod>2026-02-19T22:03:20.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-do-we-need-to-see-into-connected-devices</loc>
<lastmod>2026-02-19T22:03:22.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/sbom-is-still-coming-examining-the-proposed-far-amendments</loc>
<lastmod>2026-02-19T22:03:23.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/active-vulnerability-alert-looney-tunables-cause-for-concern</loc>
<lastmod>2026-02-19T22:03:24.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/countdown-to-compliance-why-connected-device-manufacturers-must-prepare-for-the-eu-cra-now</loc>
<lastmod>2026-02-19T22:03:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/exiting-the-game-key-takeaways-and-future-quests</loc>
<lastmod>2026-02-19T22:03:26.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cd-marketplace-extensions</loc>
<lastmod>2026-02-19T22:03:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/conformity-assessments-eu-cra-requirements</loc>
<lastmod>2026-02-19T22:03:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/nist-defines-critical-software</loc>
<lastmod>2026-02-19T22:03:29.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/buckle-up-for-security-a-look-at-the-un-r155-regulation-for-connected-vehicles</loc>
<lastmod>2026-02-19T22:03:30.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/product-security-maturity-for-cisos</loc>
<lastmod>2026-02-19T22:03:32.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/navigating-secure-software-supply-chains-unveiling-the-power-of-sca-and-sbom</loc>
<lastmod>2026-02-19T22:03:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/closing-iot-scanning-gaps</loc>
<lastmod>2026-02-19T22:03:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/top-12-iot-exploits-of-2021-p2</loc>
<lastmod>2026-02-19T22:03:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/oregon-consumer-privacy-act</loc>
<lastmod>2026-02-19T22:03:37.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/9-practical-uses-for-software-bill-of-materials-sboms</loc>
<lastmod>2026-02-19T22:03:38.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/prioritization-step-3-of-connected-device-security</loc>
<lastmod>2026-02-19T22:03:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/implementing-software-supply-chain-security-best-practices</loc>
<lastmod>2026-02-19T22:03:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/eu-eprivacy-directive</loc>
<lastmod>2026-02-19T22:03:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/tune-in-now-a-must-listen-podcast-episode-on-iot-security-and-the-u.s.-cyber-trust-mark</loc>
<lastmod>2026-02-19T22:03:43.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-cyber-insurance-questionnaire-please-tell-me-theres-another-way</loc>
<lastmod>2026-02-19T22:03:44.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/P9w9J5JKNAyEIGi-H9SVA</loc>
<lastmod>2026-02-19T22:03:45.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/nist-cybersecurity-standards</loc>
<lastmod>2026-02-19T22:03:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/active-vulnerability-alert-the-webp-library-vulnerability-cve-2023-4863-what-you-need-to-know</loc>
<lastmod>2026-02-19T22:03:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/regarding-executive-order-13920-securing-the-united-states-bulk-power-system</loc>
<lastmod>2026-02-19T22:03:49.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-cyber-security-cyberbasics</loc>
<lastmod>2026-02-19T22:03:50.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/future-of-sbom-software-supply-chain-security</loc>
<lastmod>2026-02-19T22:03:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/announcing-emea-expansion</loc>
<lastmod>2026-02-19T22:03:53.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/our-github-actions-marketplace-apps-are-live</loc>
<lastmod>2026-02-19T22:03:54.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/experts-opinion-executive-order-ai-security</loc>
<lastmod>2026-02-19T22:03:55.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/delaware-data-privacy-act</loc>
<lastmod>2026-02-19T22:03:56.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/software-supply-chain-risk-mitigation-cassie-crossley</loc>
<lastmod>2026-02-19T22:03:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/holistic-product-security-part-1-open-source-software-risk</loc>
<lastmod>2026-02-19T22:03:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/our-s4x24-main-stage-presentation-the-quest-for-sboms-and-the-legend-of-the-sbomd-substation</loc>
<lastmod>2026-02-19T22:03:59.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/overcoming-key-challenges-in-vulnerability-and-incident-management-for-eu-cra-compliance</loc>
<lastmod>2026-02-19T22:04:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/virginia-consumer-data-protection-act</loc>
<lastmod>2026-02-19T22:04:01.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/top-6-ways-product-security-affects-your-bottom-line</loc>
<lastmod>2026-02-19T22:04:03.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/top-10-java-libraries</loc>
<lastmod>2026-02-19T22:04:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/snyk-vs-mend-vs-finite-state</loc>
<lastmod>2026-02-19T22:04:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-openssl</loc>
<lastmod>2026-02-19T22:04:06.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-a-software-bill-of-materials-sbom</loc>
<lastmod>2026-02-19T22:04:07.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/ciso-compliance-guide-finite-state</loc>
<lastmod>2026-02-19T22:04:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/exploring-the-role-of-software-composition-analysis</loc>
<lastmod>2026-02-19T22:04:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-to-look-for-in-an-sbom-management-solution</loc>
<lastmod>2026-02-19T22:04:11.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-binary-analysis-matters-in-software-supply-chain-security-and-sbom-generation</loc>
<lastmod>2026-02-19T22:04:12.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/so-what-the-heck-are-you-supposed-to-do-with-an-sbom-with-dr.-george-shea-chief-technologist-at-the-foundation-for-defense-of-democracies</loc>
<lastmod>2026-02-19T22:04:13.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/automotive-cybersecurity-standards-a-primer</loc>
<lastmod>2026-02-19T22:04:14.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-interplay-of-ai-and-cybersecurity-insights-from-alexander-fleischer-on-the-iot-the-internet-of-threats-podcast</loc>
<lastmod>2026-02-19T22:04:16.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/when-to-upgrade-product-security-tools</loc>
<lastmod>2026-02-19T22:04:17.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/finite-state-finds-critical-vulnerability-in-philips-medical-devices</loc>
<lastmod>2026-02-19T22:04:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-is-it-so-hard-to-see-into-connected-devices</loc>
<lastmod>2026-02-19T22:04:19.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/eu-cra-sbom-technical-documentation-guide</loc>
<lastmod>2026-02-19T22:04:20.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/unpacking-the-data-revolution-in-cybersecurity-a-deep-dive-with-dino-boukouris-on-iot-the-internet-of-threats-podcast</loc>
<lastmod>2026-02-19T22:04:21.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/electric-vehicle-cybersecurity-what-are-the-risks</loc>
<lastmod>2026-02-19T22:04:22.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/securing-opaque-vendors-iot</loc>
<lastmod>2026-02-19T22:04:23.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/whats-going-on-with-ics-security-and-whats-sbom-got-to-do-with-it</loc>
<lastmod>2026-02-19T22:04:24.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/top-10-java-vulnerabilities</loc>
<lastmod>2026-02-19T22:04:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/youve-been-hacked.-should-you-call-the-fbi-with-jeffrey-tricoli</loc>
<lastmod>2026-02-19T22:04:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/best-java-scanner</loc>
<lastmod>2026-02-19T22:04:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/when-container-scanning-falls-short</loc>
<lastmod>2026-02-19T22:04:29.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-vulnerability-scanning</loc>
<lastmod>2026-02-19T22:04:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/ffiec-cybersecurity-assessment-tool</loc>
<lastmod>2026-02-19T22:04:32.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/more-than-sboms-comprehensive-software-security-for-connected-vehicles</loc>
<lastmod>2026-02-19T22:04:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/fisa</loc>
<lastmod>2026-02-19T22:04:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/doing-git-pull-wrong</loc>
<lastmod>2026-02-19T22:04:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/software-supply-chain-security-risk-register</loc>
<lastmod>2026-02-19T22:04:37.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/quebec-law-25</loc>
<lastmod>2026-02-19T22:04:38.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/under-the-hood-sboms-integral-role-in-connected-automotive-cybersecurity</loc>
<lastmod>2026-02-19T22:04:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-sboms-streamline-medical-device-security</loc>
<lastmod>2026-02-19T22:04:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/firmware-vs-source-code-security</loc>
<lastmod>2026-02-19T22:04:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/celebrating-a-milestone-in-cybersecurity-finite-state-joins-the-secure-by-design-pledge-at-rsac-2024</loc>
<lastmod>2026-02-19T22:04:42.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/reachability-feature-release</loc>
<lastmod>2026-02-19T22:04:43.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/requesting-acquiring-and-getting-value-from-sboms-enhancing-automotive-cybersecurity</loc>
<lastmod>2026-02-19T22:04:44.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/owasp-top-10-2021-webinar</loc>
<lastmod>2026-02-19T22:04:45.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/vulnerability-or-backdoor</loc>
<lastmod>2026-02-19T22:04:47.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/anatomy-of-a-firmware-breach-how-they-happen-and-how-to-defend-your-organization</loc>
<lastmod>2026-02-19T22:04:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/QuJQh9whrCyA-I_CKrNmb</loc>
<lastmod>2026-02-19T22:04:49.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/psti-act-iot-compliance-uk</loc>
<lastmod>2026-02-19T22:04:50.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-secure-defaults-best-practices</loc>
<lastmod>2026-02-19T22:04:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-sbom-evolution-from-uncharted-concept-to-cybersecurity-cornerstone</loc>
<lastmod>2026-02-19T22:04:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/security-by-design-eu-cra-guide</loc>
<lastmod>2026-02-19T22:04:53.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-to-get-started-with-product-security</loc>
<lastmod>2026-02-19T22:04:54.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/log4j-in-your-embedded-products</loc>
<lastmod>2026-02-19T22:04:55.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/emerging-in-iot-why-does-it-matter</loc>
<lastmod>2026-02-19T22:04:56.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/new-hampshire-consumer-data-privacy-act</loc>
<lastmod>2026-02-19T22:04:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/present-future-finite-state</loc>
<lastmod>2026-02-19T22:04:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/unveiling-the-sbom-enigma-navigating-through-levels-2-to-4</loc>
<lastmod>2026-02-19T22:04:59.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/benefits-consolidating-security-tooling-findings</loc>
<lastmod>2026-02-19T22:05:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/security-processes-connected-devices</loc>
<lastmod>2026-02-19T22:05:01.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-open-source-tools-are-inadequate</loc>
<lastmod>2026-02-19T22:05:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/pipeda-canada</loc>
<lastmod>2026-02-19T22:05:03.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-security-strategies-compliance-best-practices</loc>
<lastmod>2026-02-19T22:05:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/key-cybersecurity-challenges-energy-sector</loc>
<lastmod>2026-02-19T22:05:06.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/soc2</loc>
<lastmod>2026-02-19T22:05:07.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/codegreen-announcement</loc>
<lastmod>2026-02-19T22:05:08.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/devsecops-ci-cd-maturity-guide</loc>
<lastmod>2026-02-19T22:05:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/security-weekly-podcast</loc>
<lastmod>2026-02-19T22:05:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/navigating-sbom-compliance-requirements</loc>
<lastmod>2026-02-19T22:05:11.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/KHMjH82p4R29bk_PcOBBM</loc>
<lastmod>2026-02-19T22:05:12.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/montana-consumer-data-privacy-act</loc>
<lastmod>2026-02-19T22:05:13.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/finite-state-unveils-new-partnership-program</loc>
<lastmod>2026-02-19T22:05:15.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-does-sbom-management-ensure-software-supply-chain-security</loc>
<lastmod>2026-02-19T22:05:16.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/fedramp</loc>
<lastmod>2026-02-19T22:05:17.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/is-your-software-truly-secure-discover-how-finite-state-reinvents-software-security-analysis</loc>
<lastmod>2026-02-19T22:05:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-we-signed-cisas-secure-by-design-pledge</loc>
<lastmod>2026-02-19T22:05:19.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-product-security-drives-financial-performance-and-brand-trust</loc>
<lastmod>2026-02-19T22:05:21.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/new-jersey-disclosure-accountability-transparency-act</loc>
<lastmod>2026-02-19T22:05:22.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-quest-for-sboms-and-the-legend-of-the-sbomd-substation</loc>
<lastmod>2026-02-19T22:05:23.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/exploitable-vulnerabilities-that-expose-healthcare-facilities-surged-nearly-60-since-2022</loc>
<lastmod>2026-02-19T22:05:24.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/six-solid-reasons-to-demo-finite-state</loc>
<lastmod>2026-02-19T22:05:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-software-composition-analysis-sca</loc>
<lastmod>2026-02-19T22:05:26.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/ntia-sbom-minimum-elements</loc>
<lastmod>2026-02-19T22:05:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/sbom-challenge-day-2</loc>
<lastmod>2026-02-19T22:05:29.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/eu-red-article-3-3-cybersecurity</loc>
<lastmod>2026-02-19T22:05:30.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/sbom-challenge-analysis-a-day-after</loc>
<lastmod>2026-02-19T22:05:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-malware</loc>
<lastmod>2026-02-19T22:05:32.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/improvement-step-6-of-connected-device-security</loc>
<lastmod>2026-02-19T22:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/heres-how-to-get-audit-readiness-right-for-connected-devices</loc>
<lastmod>2026-02-19T22:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/drive-iot-security-from-the-start</loc>
<lastmod>2026-02-19T22:05:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/nis2-directive</loc>
<lastmod>2026-02-19T22:05:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/navigating-the-terrain-of-recent-curl-vulnerabilities-a-proactive-approach-to-software-supply-chain-security</loc>
<lastmod>2026-02-19T22:05:37.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-first-thing-about-software-supply-chain-security</loc>
<lastmod>2026-02-19T22:05:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/uncovering-the-critical-vulnerability-in-xz-utils-with-the-finite-state-next-generation-platform</loc>
<lastmod>2026-02-19T22:05:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/digging-into-cisas-product-line-build-sbom-advice</loc>
<lastmod>2026-02-19T22:05:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/navigating-the-labyrinth-from-vulnerability-hoards-to-triaging-towers</loc>
<lastmod>2026-02-19T22:05:42.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/defending-against-iot-in-defense</loc>
<lastmod>2026-02-19T22:05:43.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/sbom-guide-software-supply-chain-security</loc>
<lastmod>2026-02-19T22:05:45.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/mind-of-a-hacker-role-of-a-defender</loc>
<lastmod>2026-02-19T22:05:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-to-identify-vulnerabilities-in-open-source-code</loc>
<lastmod>2026-02-19T22:05:47.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/adding-smart-security-to-smart-buildings</loc>
<lastmod>2026-02-19T22:05:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/himms-cybersecurity-maturity-model</loc>
<lastmod>2026-02-19T22:05:49.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/evolving-cybersecurity-in-the-automotive-industry-the-role-of-sboms-in-case-vehicles</loc>
<lastmod>2026-02-19T22:05:50.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/executive-order-14144-cybersecurity</loc>
<lastmod>2026-02-19T22:05:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/singapores-pdpa</loc>
<lastmod>2026-02-19T22:05:53.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/uk-cybersecurity-regulations-2025-2030</loc>
<lastmod>2026-02-19T22:05:54.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/ssdlc-global-cybersecurity-regulations</loc>
<lastmod>2026-02-19T22:05:56.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/recent-hacking-incidents-2023</loc>
<lastmod>2026-02-19T22:05:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/texas-data-privacy-security-act</loc>
<lastmod>2026-02-19T22:05:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/prioritization-which-issues-to-address-first</loc>
<lastmod>2026-02-19T22:05:59.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/assessment-step-2-of-connected-device-security</loc>
<lastmod>2026-02-19T22:06:01.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-i-learned-today-the-complexities-of-medical-device-security-0</loc>
<lastmod>2026-02-19T22:06:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/urgent-call-for-enhanced-cybersecurity-in-healthcare-research-sheds-light-on-rising-threats</loc>
<lastmod>2026-02-19T22:06:03.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-ai-enhances-supply-chain-security</loc>
<lastmod>2026-02-19T22:06:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-cve-cyberbasics</loc>
<lastmod>2026-02-19T22:06:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/securing-the-connected-future-a-deep-dive-into-iot-software-security</loc>
<lastmod>2026-02-19T22:06:06.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cve-2024-3094-exploitability</loc>
<lastmod>2026-02-19T22:06:07.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/unlocking-device-security-how-binary-sca-transforms-your-product-safety-game</loc>
<lastmod>2026-02-19T22:06:08.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cloud-act</loc>
<lastmod>2026-02-19T22:06:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/devsecops-for-iot-compliance</loc>
<lastmod>2026-02-19T22:06:11.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-fdas-new-refuse-to-accept-authority-and-how-sbom-can-help</loc>
<lastmod>2026-02-19T22:06:12.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/indiana-consumer-data-protection-act</loc>
<lastmod>2026-02-19T22:06:13.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/technical-guide-to-cross-framework-compliance-iot</loc>
<lastmod>2026-02-19T22:06:15.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-a-cybercrime-cyberbasics</loc>
<lastmod>2026-02-19T22:06:16.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/fcc-launches-cyber-trust-mark-a-voluntary-cybersecurity-labeling-for-smart-products</loc>
<lastmod>2026-02-19T22:06:17.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/did-ripple20-raise-a-false-alarm-finite-state-finds-discrepancies</loc>
<lastmod>2026-02-19T22:06:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-open-source-software</loc>
<lastmod>2026-02-19T22:06:19.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iso-27001</loc>
<lastmod>2026-02-19T22:06:20.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/improve-software-supply-chain-maturity</loc>
<lastmod>2026-02-19T22:06:22.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/fda-medical-device-regulations</loc>
<lastmod>2026-02-19T22:06:23.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/vulnerability-trends-in-connected-device-supply-chains</loc>
<lastmod>2026-02-19T22:06:24.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/eu-eprivacy-regulation</loc>
<lastmod>2026-02-19T22:06:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/finite-state-response-and-collaboration-in-light-of-the-nvd-slowdown</loc>
<lastmod>2026-02-19T22:06:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/discovery-step-1-of-connected-device-security</loc>
<lastmod>2026-02-19T22:06:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/enhance-software-security-with-static-application-security-testing-a-comprehensive-guide</loc>
<lastmod>2026-02-19T22:06:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/dubai-personal-data-protection-law</loc>
<lastmod>2026-02-19T22:06:29.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/device-manufacturers</loc>
<lastmod>2026-02-19T22:06:30.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/social-engineering-insider-threats-java-security</loc>
<lastmod>2026-02-19T22:06:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/open-source-risk-plugging-the-hole</loc>
<lastmod>2026-02-19T22:06:32.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-rising-tide-of-cybersecurity-in-electric-utilities</loc>
<lastmod>2026-02-19T22:06:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/software-supply-chain-security-and-the-eu-cra-a-manufacturers-guide</loc>
<lastmod>2026-02-19T22:06:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/exploring-cybersecurity-liability-and-the-national-cybersecurity-strategy-a-conversation-with-john-banghart</loc>
<lastmod>2026-02-19T22:06:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-unknown-knowns-vulnerabilities-hiding-in-your-devices</loc>
<lastmod>2026-02-19T22:06:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/snyk-vs-black-duck-vs-finite-state</loc>
<lastmod>2026-02-19T22:06:37.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/holistic-product-security-part-2-system-configuration</loc>
<lastmod>2026-02-19T22:06:38.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/reducing-the-risks-from-iot-in-entertainment</loc>
<lastmod>2026-02-19T22:06:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-future-of-iot-security-conversations-at-ces-2025</loc>
<lastmod>2026-02-19T22:06:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/dbir-2025-supply-chain-chaos</loc>
<lastmod>2026-02-19T22:06:42.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/connected-device-security-challenges</loc>
<lastmod>2026-02-19T22:06:43.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/whats-next-for-medical-device-cybersecurity</loc>
<lastmod>2026-02-19T22:06:45.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cisa-product-security-bad-practices</loc>
<lastmod>2026-02-19T22:06:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/secure-your-oss-supply-chain</loc>
<lastmod>2026-02-19T22:06:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/choosing-the-right-product-security-solution-for-your-software-supply-chain</loc>
<lastmod>2026-02-19T22:06:49.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-sbom-and-binary-analysis-enhance-software-supply-chain-security</loc>
<lastmod>2026-02-19T22:06:50.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/critical-look-at-cyber-security-investment</loc>
<lastmod>2026-02-19T22:06:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-a-cyber-attack-cyberbasics</loc>
<lastmod>2026-02-19T22:06:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/black-duck-vs-finite-state</loc>
<lastmod>2026-02-19T22:06:54.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/all-you-need-is-exploit-maturity-first-impressions-of-the-cvss-4.0-preview</loc>
<lastmod>2026-02-19T22:06:55.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/reachability-analysis-iot-security</loc>
<lastmod>2026-02-19T22:06:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/connecticut-data-privacy-act</loc>
<lastmod>2026-02-19T22:06:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/tipa</loc>
<lastmod>2026-02-19T22:06:59.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-in-the-world-do-you-measure-cybersecurity-anyway-with-michael-daniel</loc>
<lastmod>2026-02-19T22:07:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/insight-into-sboms-how-to-make-product-security-easier-across-the-software-supply-chain</loc>
<lastmod>2026-02-19T22:07:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/open-source-license-compliance</loc>
<lastmod>2026-02-19T22:07:03.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/executive-order-cybersecurity</loc>
<lastmod>2026-02-19T22:07:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/edpb-guidelines</loc>
<lastmod>2026-02-19T22:07:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/solarwinds-sunburst-intrusion-attack</loc>
<lastmod>2026-02-19T22:07:07.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/T-ylVUlH_GWKsg2XxdIuk</loc>
<lastmod>2026-02-19T22:07:08.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/detecting-verifying-vulnerabilities</loc>
<lastmod>2026-02-19T22:07:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/elevating-cybersecurity-in-electric-utilities-the-crucial-role-of-sboms</loc>
<lastmod>2026-02-19T22:07:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/uk-dpa</loc>
<lastmod>2026-02-19T22:07:11.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/finite-state-vs-mend-iot-security</loc>
<lastmod>2026-02-19T22:07:12.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-case-for-sboms-when-navigating-connected-auto-cybersecurity-standards</loc>
<lastmod>2026-02-19T22:07:13.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/dbir-2025-product-supply-chain-security</loc>
<lastmod>2026-02-19T22:07:15.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/introducing-rust-support</loc>
<lastmod>2026-02-19T22:07:16.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/dual-layer-security-scanning-source-code-binary-analysis-roi</loc>
<lastmod>2026-02-19T22:07:17.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/log4j-reunion-tour-2022</loc>
<lastmod>2026-02-19T22:07:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/provenance-connected-device-risk</loc>
<lastmod>2026-02-19T22:07:19.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/secure-your-software-supply-chain-the-finite-state-buyers-guide-for-product-security-solutions</loc>
<lastmod>2026-02-19T22:07:20.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-software-bill-of-materials-sbom-coming-of-age-in-software-supply-chain-security</loc>
<lastmod>2026-02-19T22:07:21.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/bridging-iot-security-gap-webinar-summary</loc>
<lastmod>2026-02-19T22:07:22.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/immature-product-security-risks</loc>
<lastmod>2026-02-19T22:07:23.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/challenges-meeting-eu-cra-product-lifecycle-support-requirements</loc>
<lastmod>2026-02-19T22:07:24.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-future-of-connected-device-security-post-cisa-guidance</loc>
<lastmod>2026-02-19T22:07:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/industry-report-false-positives-software-security</loc>
<lastmod>2026-02-19T22:07:26.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/u.s.-cyber-trust-mark-what-manufacturers-need-to-know</loc>
<lastmod>2026-02-19T22:07:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/secure-iot-product-development-strategies</loc>
<lastmod>2026-02-19T22:07:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-cybersecurity-improvement-act</loc>
<lastmod>2026-02-19T22:07:29.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/open-source-dependency-management-iot</loc>
<lastmod>2026-02-19T22:07:30.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-product-security</loc>
<lastmod>2026-02-19T22:07:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-automation-isnt-enough-for-embedded-security</loc>
<lastmod>2026-02-19T22:07:32.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/eba-guidelines-on-ict-security-risk</loc>
<lastmod>2026-02-19T22:07:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cis-critical-security-controls</loc>
<lastmod>2026-02-19T22:07:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/general-data-protection-regulation-gdpr</loc>
<lastmod>2026-02-19T22:07:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/shift-left-testing-guide</loc>
<lastmod>2026-02-19T22:07:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cra-compliance-iot-competitive-advantage</loc>
<lastmod>2026-02-19T22:07:37.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/ripple20-a-reflection</loc>
<lastmod>2026-02-19T22:07:38.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/finite-state-acquires-mergebase-to-form-a-powerhouse-in-application-security</loc>
<lastmod>2026-02-19T22:07:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-a-data-breach-cyberbasics</loc>
<lastmod>2026-02-19T22:07:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/hipaa</loc>
<lastmod>2026-02-19T22:07:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cd-plugins</loc>
<lastmod>2026-02-19T22:07:42.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/pci-dss</loc>
<lastmod>2026-02-19T22:07:43.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/building-modern-iot-security-stack</loc>
<lastmod>2026-02-19T22:07:44.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/mergebase-vs-sonatype-sca-tools-compared</loc>
<lastmod>2026-02-19T22:07:45.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/exploring-standards-and-regulations-for-automotive-cybersecurity</loc>
<lastmod>2026-02-19T22:07:47.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-future-of-medical-device-cybersecurity-an-interview-with-larry-pesce</loc>
<lastmod>2026-02-19T22:07:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/software-supply-chain-security-measuring-the-success-of-your-program-1</loc>
<lastmod>2026-02-19T22:07:49.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/securing-iot-within-the-financial-services-and-insurance-industries</loc>
<lastmod>2026-02-19T22:07:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-does-finite-state-support-automakers-in-meeting-iso-standards</loc>
<lastmod>2026-02-19T22:07:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-try-the-finite-state-product-security-maturity-model</loc>
<lastmod>2026-02-19T22:07:54.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/revving-up-case-vehicle-security-with-sboms</loc>
<lastmod>2026-02-19T22:07:55.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/shift-left-security</loc>
<lastmod>2026-02-19T22:07:56.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/incident-response-instill-confidence-in-your-connected-products</loc>
<lastmod>2026-02-19T22:07:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/beecham-research-highlights-the-growing-risks-opportunities-iot</loc>
<lastmod>2026-02-19T22:07:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iomt-security-protecting-all-devices</loc>
<lastmod>2026-02-19T22:08:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/six-things-to-consider-when-evaluating-software-security-solutions</loc>
<lastmod>2026-02-19T22:08:01.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-does-the-fdas-final-guidance-say-about-sboms</loc>
<lastmod>2026-02-19T22:08:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/three-steps-toward-better-software-supply-chain-security</loc>
<lastmod>2026-02-19T22:08:03.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/software-transparency-the-need-for-enhanced-connected-device-security</loc>
<lastmod>2026-02-19T22:08:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-are-you-generating-sboms-now-how-can-automation-help</loc>
<lastmod>2026-02-19T22:08:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/false-positives-embedded-security</loc>
<lastmod>2026-02-19T22:08:06.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/securing-case-vehicles-in-a-new-era-of-automotive-cybersecurity</loc>
<lastmod>2026-02-19T22:08:08.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/staying-safe-with-iot-in-retail</loc>
<lastmod>2026-02-19T22:08:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-will-it-look-like-as-the-u.s.-cyber-trust-mark-certification-program-comes-online</loc>
<lastmod>2026-02-19T22:08:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/pipa-british-columbia</loc>
<lastmod>2026-02-19T22:08:12.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/department-of-commerce-connected-vehicle-rule</loc>
<lastmod>2026-02-19T22:08:13.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cybersecurity-risk-assessments</loc>
<lastmod>2026-02-19T22:08:14.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-software-supply-chain-security</loc>
<lastmod>2026-02-19T22:08:16.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-a-software-supply-chain-attack</loc>
<lastmod>2026-02-19T22:08:16.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/dod-fast-track-swift-cybersecurity-compliance</loc>
<lastmod>2026-02-19T22:08:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/navigating-the-complexities-of-embedded-software-testing-a-comprehensive-guide</loc>
<lastmod>2026-02-19T22:08:19.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/industrial-manufacturing-security-with-finite-state</loc>
<lastmod>2026-02-19T22:08:20.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/when-worlds-collide-how-iot-changes-cyber-risk</loc>
<lastmod>2026-02-19T22:08:21.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/bill-c-26-ccspa-guide</loc>
<lastmod>2026-02-19T22:08:22.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/uk-gdpr</loc>
<lastmod>2026-02-19T22:08:24.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/choosing-java-libraries</loc>
<lastmod>2026-02-19T22:08:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-routers</loc>
<lastmod>2026-02-19T22:08:26.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/sbom-mistakes</loc>
<lastmod>2026-02-19T22:08:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/challenges-facing-connected-device-manufacturers</loc>
<lastmod>2026-02-19T22:08:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-compliance-regulations-security-challenges</loc>
<lastmod>2026-02-19T22:08:29.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/mergebases-bob-lyle-presents-at-gsma-fasg-29-istanbul</loc>
<lastmod>2026-02-19T22:08:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/charting-the-digital-terrain-a-primer-on-sbom-vulnerability-management</loc>
<lastmod>2026-02-19T22:08:32.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/five-practical-steps</loc>
<lastmod>2026-02-19T22:08:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/transporting-security-into-iot</loc>
<lastmod>2026-02-19T22:08:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/free-vulnerability-scanners-hidden-costs</loc>
<lastmod>2026-02-19T22:08:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/critical-java-log4j-vulnerability</loc>
<lastmod>2026-02-19T22:08:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-cra-compliance-vulnerability-response</loc>
<lastmod>2026-02-19T22:08:37.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/expanding-cisa-guidance-iot-security</loc>
<lastmod>2026-02-19T22:08:38.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/next-gen-platform-introducing-our-new-dashboards</loc>
<lastmod>2026-02-19T22:08:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/transparency-is-crucial-for-supply-chain-security</loc>
<lastmod>2026-02-19T22:08:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/active-vulnerability-alert-openssh</loc>
<lastmod>2026-02-19T22:08:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-finite-state-part-i</loc>
<lastmod>2026-02-19T22:08:43.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/report-finds-cybersecurity-vulnerabilities-embedded-within-huawei-devices</loc>
<lastmod>2026-02-19T22:08:44.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-compliance-debt-and-cyber-resilience</loc>
<lastmod>2026-02-19T22:08:45.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/wall-street-journal-huawei-research-finite-state</loc>
<lastmod>2026-02-19T22:08:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/defending-your-connected-assets-a-guide-to-software-supply-chain-attack-management</loc>
<lastmod>2026-02-19T22:08:47.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-sbom-challenge-wait-...-there-was-a-contest-who-won-with-matt-wyckhouse-founder-ceo-of-finite-state</loc>
<lastmod>2026-02-19T22:08:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/finite-state-continues-to-expand-executive-team</loc>
<lastmod>2026-02-19T22:08:49.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/streamline-developer-security-workflows</loc>
<lastmod>2026-02-19T22:08:50.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/navigating-the-world-of-automotive-regulatory-compliance-in-the-age-of-connected-devices</loc>
<lastmod>2026-02-19T22:08:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/eu-cra-common-software-supply-chain-security-obstacles</loc>
<lastmod>2026-02-19T22:08:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/WvcQJYs2mrP00xk4m-hUs</loc>
<lastmod>2026-02-19T22:08:53.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-truth-about-ransomware-and-how-to-stop-it-with-megan-stifel-of-ist</loc>
<lastmod>2026-02-19T22:08:54.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/defining-product-security-in-2024</loc>
<lastmod>2026-02-19T22:08:56.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/managing-open-source-risk-with-device-composition-analysis</loc>
<lastmod>2026-02-19T22:08:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/bdsg</loc>
<lastmod>2026-02-19T22:08:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/a-comprehensive-guide-to-software-security-testing</loc>
<lastmod>2026-02-19T22:08:59.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/sec-cybersecurity-guidelines-data-breach</loc>
<lastmod>2026-02-19T22:09:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-do-you-make-iot-pen-testing-easier</loc>
<lastmod>2026-02-19T22:09:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/utah-consumer-privacy-act</loc>
<lastmod>2026-02-19T22:09:03.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/snyk-vs-finite-state</loc>
<lastmod>2026-02-19T22:09:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/enhancing-vulnerability-prioritization-with-epss-a-game-changer-for-product-security-teams</loc>
<lastmod>2026-02-19T22:09:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/r7InU-QUXvYZgK2rh4Ai2</loc>
<lastmod>2026-02-19T22:09:07.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-i-learned-today-the-complexities-of-medical-device-security</loc>
<lastmod>2026-02-19T22:09:08.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/eu-cybersecurity-act</loc>
<lastmod>2026-02-19T22:09:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/mend-vs-finite-state</loc>
<lastmod>2026-02-19T22:09:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/whats-next-for-automotive-cybersecurity</loc>
<lastmod>2026-02-19T22:09:12.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/prepare-for-eu-cyber-resilience-act</loc>
<lastmod>2026-02-19T22:09:13.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/guide-to-sbom-vulnerability-analysis-understanding-the-basics</loc>
<lastmod>2026-02-19T22:09:14.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/eu-cyber-resilience-act</loc>
<lastmod>2026-02-19T22:09:15.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-aftershock-of-ripple20</loc>
<lastmod>2026-02-19T22:09:16.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/unified-sdf-cybersecurity-compliance</loc>
<lastmod>2026-02-19T22:09:17.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/glba</loc>
<lastmod>2026-02-19T22:09:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/japan-appi</loc>
<lastmod>2026-02-19T22:09:19.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-a-script-kiddie-cyberbasics</loc>
<lastmod>2026-02-19T22:09:20.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/medical-device-security-should-i-worry-about-my-pacemaker-being-hacked-with-errol-weiss-and-phil-englert</loc>
<lastmod>2026-02-19T22:09:22.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/sbom-challenge-day-1</loc>
<lastmod>2026-02-19T22:09:23.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-a-threat-actor-cyberbasics</loc>
<lastmod>2026-02-19T22:09:24.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/software-supply-chain-security-assessment-framework</loc>
<lastmod>2026-02-19T22:09:26.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/a-comprehensive-guide-to-medical-device-vulnerability-management</loc>
<lastmod>2026-02-19T22:09:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/new-enhanced-dependency-capabilities</loc>
<lastmod>2026-02-19T22:09:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/black-duck-vs-mend-vs-finite-state</loc>
<lastmod>2026-02-19T22:09:29.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/brazil-lgpd</loc>
<lastmod>2026-02-19T22:09:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/securing-the-future-binary-analysis-in-the-age-of-smart-cities</loc>
<lastmod>2026-02-19T22:09:32.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/navigating-software-component-license-risks-and-open-source-compliance-rules</loc>
<lastmod>2026-02-19T22:09:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cisas-secure-software-development-attestation-form-how-sboms-and-connected-device-security-can-help</loc>
<lastmod>2026-02-19T22:09:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/introducing-dart-support</loc>
<lastmod>2026-02-19T22:09:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/its-almost-here-but-does-the-eu-cra-go-too-far</loc>
<lastmod>2026-02-19T22:09:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-enterprises-demand-security-proof</loc>
<lastmod>2026-02-19T22:09:38.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/securing-the-devops-pipeline-you-can-do-it-the-way-intel-does-with-darren-pulsipher</loc>
<lastmod>2026-02-19T22:09:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/sboms-software-supply-chain-risk-management</loc>
<lastmod>2026-02-19T22:09:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/beyond-sbom-for-cybersecurity-compliance</loc>
<lastmod>2026-02-19T22:09:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/embracing-fda-524b-transforming-the-cybersecurity-landscape-for-medical-devices</loc>
<lastmod>2026-02-19T22:09:42.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/remediation-step-4-of-connected-device-security</loc>
<lastmod>2026-02-19T22:09:43.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/eu-cyber-resilience-act-uk-manufacturers</loc>
<lastmod>2026-02-19T22:09:44.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/source-code-vs-binary-analysis-software-security</loc>
<lastmod>2026-02-19T22:09:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-a-comprehensive-sbom-means-to-asset-owners</loc>
<lastmod>2026-02-19T22:09:47.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/california-consumer-privacy-act</loc>
<lastmod>2026-02-19T22:09:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-finite-state-aligns-with-fda-requirements-for-medical-device-sboms</loc>
<lastmod>2026-02-19T22:09:49.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/australian-privacy-principles</loc>
<lastmod>2026-02-19T22:09:50.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/top-three-reasons-iot-is-a-security-risk-in-manufacturing</loc>
<lastmod>2026-02-19T22:09:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/finite-state-and-device-authority-announce-partnership-to-ensure-security-of-iot-software-supply-chain</loc>
<lastmod>2026-02-19T22:09:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/secure-by-design-guide</loc>
<lastmod>2026-02-19T22:09:53.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/git-v-branching-model</loc>
<lastmod>2026-02-19T22:09:55.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-sbom-and-technical-docs-are-essential-for-iot-security</loc>
<lastmod>2026-02-19T22:09:56.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/vulnerability-remediation-and-mitigation-runtime-application-security</loc>
<lastmod>2026-02-19T22:09:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/cost-of-delayed-iot-security</loc>
<lastmod>2026-02-19T22:09:59.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/new-york-shield-act</loc>
<lastmod>2026-02-19T22:10:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/why-shift-right-on-testing</loc>
<lastmod>2026-02-19T22:10:01.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/missed-larry-pesces-talk-at-rsac-2024-join-us-for-a-webinar-in-june</loc>
<lastmod>2026-02-19T22:10:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/just-how-hard-is-it-to-launch-an-offensive-cyber-operation-with-tj-white</loc>
<lastmod>2026-02-19T22:10:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/top-software-supply-chain-threats-2025</loc>
<lastmod>2026-02-19T22:10:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/customer-spotlight-johnson-controls-named-iot-partner-ecosystem-of-the-year-in-2021-iot-breakthrough-awards</loc>
<lastmod>2026-02-19T22:10:06.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/best-tools-for-generating-sbom</loc>
<lastmod>2026-02-19T22:10:07.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/bcbs-outsourcing-guidelines</loc>
<lastmod>2026-02-19T22:10:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/software-third-party-liability-cyber-security-law</loc>
<lastmod>2026-02-19T22:10:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/scmagazine-huawei-research-finite-state</loc>
<lastmod>2026-02-19T22:10:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-biggest-pain-points-for-product-security-teams</loc>
<lastmod>2026-02-19T22:10:12.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iot-security-scanner-blindspots</loc>
<lastmod>2026-02-19T22:10:12.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/how-to-build-a-product-security-program</loc>
<lastmod>2026-02-19T22:10:13.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/a-day-later-analyzing-bidens-national-cybersecurity-strategy</loc>
<lastmod>2026-02-19T22:10:15.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/binary-software-composition-analysis-sca</loc>
<lastmod>2026-02-19T22:10:16.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/iowa-consumer-data-privacy-act</loc>
<lastmod>2026-02-19T22:10:17.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/libcurl</loc>
<lastmod>2026-02-19T22:10:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-is-application-security-testing-cyberbasics</loc>
<lastmod>2026-02-19T22:10:19.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/sboms-are-coming-the-white-house-says-so</loc>
<lastmod>2026-02-19T22:10:21.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-sbom-is-coming-with-allan-friedman</loc>
<lastmod>2026-02-19T22:10:21.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/eu-cra-product-lifecycle-support-requirements</loc>
<lastmod>2026-02-19T22:10:23.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/connected-device-security-and-vulnerability-management</loc>
<lastmod>2026-02-19T22:10:24.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/into-the-thicket-the-inventory-jungle-and-beyond</loc>
<lastmod>2026-02-19T22:10:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/demystifying-product-security-why-it-matters</loc>
<lastmod>2026-02-19T22:10:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/security-challenges-with-iot-in-hospitality</loc>
<lastmod>2026-02-19T22:10:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/product-security-teams-josh-corman</loc>
<lastmod>2026-02-19T22:10:29.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/medical-device-security-a-quick-primer-for-the-fdas-final-guidance</loc>
<lastmod>2026-02-19T22:10:30.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/what-are-the-benefits-of-software-composition-analysis</loc>
<lastmod>2026-02-19T22:10:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/the-complete-guide-to-open-source-licenses</loc>
<lastmod>2026-02-19T22:10:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/closing-the-security-gap-within-government-iot</loc>
<lastmod>2026-02-19T22:10:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/ponemon-product-security-report</loc>
<lastmod>2026-02-19T22:10:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/openssl-critical-severity-vulnerability</loc>
<lastmod>2026-02-19T22:10:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/shine-those-chompers.-the-national-cybersecurity-strategy-delivers-some-unexpected-teeth</loc>
<lastmod>2026-02-19T22:10:38.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/software-supply-chain-security-metrics</loc>
<lastmod>2026-02-19T22:10:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/embracing-security-by-design-a-necessity-in-the-age-of-increasing-iot-vulnerabilities</loc>
<lastmod>2026-02-19T22:10:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/open-source-software-in-software-supply-chains</loc>
<lastmod>2026-02-19T22:10:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/where-the-slsa-1.0-release-shines-and-its-limitations</loc>
<lastmod>2026-02-19T22:10:42.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/a-day-in-the-life-sruti</loc>
<lastmod>2026-02-19T22:10:44.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/enisa-standards</loc>
<lastmod>2026-02-19T22:10:45.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/swedish-patient-data-act</loc>
<lastmod>2026-02-19T22:10:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/connected-vehicle-rule-compliance</loc>
<lastmod>2026-02-19T22:10:47.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/blog/response-step-5-of-connected-device-security</loc>
<lastmod>2026-02-19T22:10:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/autosar-analysis-datasheet</loc>
<lastmod>2026-01-27T18:41:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/connected-vehicle-rule-compliance-guide</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/reachability-auto-resolve-datasheet</loc>
<lastmod>2025-11-27T00:30:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/finite-state-vs-black-duck-datasheet</loc>
<lastmod>2025-11-27T00:30:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/finite-state-vs-cybellum</loc>
<lastmod>2026-02-18T00:15:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/finite-state-product-security-os-datasheet</loc>
<lastmod>2026-02-14T01:14:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/connected-vehicle-webinar</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/achieving-iec-62443-compliance</loc>
<lastmod>2026-02-05T17:01:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/focusing-on-real-risk-for-cra-compliance-webinar</loc>
<lastmod>2026-01-27T19:15:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/china-gb-44495-44496-compliance-guide</loc>
<lastmod>2026-02-17T17:52:44.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/how-to-leverage-sboms-to-reduce-software-supply-chain-risk</loc>
<lastmod>2026-02-05T20:29:23.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/biden-executive-order-on-improving-us-cybersecurity</loc>
<lastmod>2026-02-05T17:52:19.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/ot-iot-router-software-supply-chain-report</loc>
<lastmod>2026-02-05T00:25:55.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/case-study-vulnerability-noise-reduction-95-percent</loc>
<lastmod>2026-01-27T18:42:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/achieve-compliance-with-executive-order-14028</loc>
<lastmod>2026-02-05T17:55:06.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/finite-state-automotive-platform-overview</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/finite-state-cybersecurity-services</loc>
<lastmod>2025-11-27T00:30:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/iec-62443-svv-3-vulnerability-testing</loc>
<lastmod>2026-02-05T17:05:08.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/accelerating-device-vulnerability-management-with-ai</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/fda-cybersecurity-compliance-datasheet</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/automotive-compliance-security-management-datasheet</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/locking-in-value-with-iot-security-beecham-research-report</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/securing-enterprise-iot-beecham-research-report</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/ces-panel-securing-the-iot</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/connected-vehicle-compliance-datasheet</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/eliminate-fda-524b-refuse-to-accept-obstacles</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/finite-state-penetration-testing-datasheet</loc>
<lastmod>2025-11-27T00:30:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/ripple-20-verification</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/eu-red-cybersecurity-compliance-finite-state</loc>
<lastmod>2025-11-27T00:30:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/from-risk-to-resilience-webinar</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/us-cyber-trust-mark-datasheet</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/huawei-supply-chain-assessment</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/iot-days-spring-iot-security-in-a-low-power-context</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/iot-days-summer-security-by-design-default</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/scaling-software-supply-chain-security-openssf-s2c2f</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/tag-cyber-regulatory-case-for-sbom</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/medical-device-security-hisac-finite-state</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/navigating-eu-cra-iot-ebook</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/the-future-state-of-medical-device-security</loc>
<lastmod>2026-02-05T00:28:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/navigating-the-regulatory-maze</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/2023-state-of-cybersecurity-for-medical-devices-and-healthcare-systems</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/eu-cra-datasheet</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/product-security-meets-detection-and-response-sans-ics-2022</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/protecting-medical-devices-from-cyber-exploitation</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/rough-around-the-edges-webinar</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/sbom-and-connected-device-security-guide</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/sbom-mangement-datasheet</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/sboms-the-hard-way</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/on-demand-webinar-securing-the-product-lifecycle</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/s2c2f-requirements-datasheet</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/security-scanning-analysis-datasheet</loc>
<lastmod>2025-11-27T00:30:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/strengthening-ot-security-in-electric-utilities</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/supply-chain-transparency-risk-management-and-compliance-for-the-auto-sector</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/supporting-connected-autonomous-shared-and-electric-case-vehicle-security-using-sboms</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/tag-cyber-supporting-industrial-control-system-cybersecurity-objectives-using-sboms</loc>
<lastmod>2026-02-05T17:19:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/tech-done-different-ai-regulations-at-def-con-32</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/eu-cra-compliance-services-datasheet</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/platform-datasheet</loc>
<lastmod>2025-11-27T00:30:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/finite-state-product-security-solutions-buyers-guide</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/future-of-iot-security</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/the-future-of-iot-security-conversations-from-ces-2025</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/securing-connected-and-embedded-devices-ponemon-institute</loc>
<lastmod>2025-11-27T00:30:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/product-security-maturity-benefits-datasheet</loc>
<lastmod>2025-12-14T02:05:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/the-ultimate-guide-to-connected-device-security</loc>
<lastmod>2025-12-14T02:05:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/connected-device-security-challenges-ebook</loc>
<lastmod>2026-02-05T00:16:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/to-infinity-and-beyond-sbom-generation</loc>
<lastmod>2025-12-14T02:05:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/good-and-evil-of-sboms</loc>
<lastmod>2025-12-14T02:05:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/unpacking-cvss-4-0</loc>
<lastmod>2025-12-14T02:05:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/vulnerability-scanning-finite-state</loc>
<lastmod>2025-12-14T02:05:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/iot-security-isnt-just-about-the-device</loc>
<lastmod>2026-02-16T20:51:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-finite-state-reduces-sdlc-complexity-and-tool-sprawl</loc>
<lastmod>2026-02-16T20:51:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/securing-the-release</loc>
<lastmod>2026-02-16T20:51:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-embedded-devices-struggle-with-security</loc>
<lastmod>2026-02-16T20:51:37.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/securing-the-product-lifecycle-building-global-compliance-into-iot-development</loc>
<lastmod>2026-02-16T20:51:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-secure-by-design-matters-and-how-finite-state-makes-it-real</loc>
<lastmod>2026-02-16T20:51:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/what-changed-from-the-draft-connected-vehicle-rule</loc>
<lastmod>2026-02-16T20:51:42.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/building-a-scalable-cra-vulnerability-disclosure-program</loc>
<lastmod>2026-02-16T20:51:43.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-to-align-security-legal-engineering-on-risk-data</loc>
<lastmod>2026-02-16T20:51:45.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/what-triggers-coverage-under-the-connected-vehicle-rule</loc>
<lastmod>2026-02-16T20:51:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/accelerating-cra-readiness-finite-state</loc>
<lastmod>2026-02-16T20:51:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/cra-checkbox-compliance-vs-sustainable-security</loc>
<lastmod>2026-02-16T20:51:49.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos//bottom-up-vulnerability-management-at-scale</loc>
<lastmod>2026-02-19T22:12:13.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/whats-in-scope-under-the-connected-vehicle-rule</loc>
<lastmod>2026-02-16T20:51:50.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-product-security-workflows-are-evolving-globally</loc>
<lastmod>2026-02-16T20:51:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos//breaking-down-product-security-silos </loc>
<lastmod>2026-02-19T22:12:15.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/component-aging-hidden-risk</loc>
<lastmod>2026-02-16T20:51:54.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/cost-of-compliance-sdlc</loc>
<lastmod>2026-02-16T20:51:55.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/are-you-impacted-by-the-connected-vehicle-rule</loc>
<lastmod>2026-02-16T20:51:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/quick-fire-product-security-questions-mike-hatherall</loc>
<lastmod>2026-02-16T20:51:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-so-many-iot-devices-remain-unpatched</loc>
<lastmod>2026-02-16T20:51:59.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-cra-compliance-is-so-hard-for-manufacturers</loc>
<lastmod>2026-02-16T20:52:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/when-sbom-and-vulnerability-data-is-fragmented</loc>
<lastmod>2026-02-16T20:52:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/cra-certification-legacy-product-prioritization</loc>
<lastmod>2026-02-16T20:52:03.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/policy-to-action-the-connected-vehicle-rule-webinar</loc>
<lastmod>2026-02-16T20:52:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/building-security-culture-language-mission-partnership</loc>
<lastmod>2026-02-16T20:52:06.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/fireside-chat-roland-lindsey-embedded-security</loc>
<lastmod>2026-02-16T20:52:07.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/silos-between-engineering-security-compliance</loc>
<lastmod>2026-02-16T20:52:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos//controls-only-compliance-connected-devices</loc>
<lastmod>2026-02-19T22:12:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/cra-vulnerability-reporting-automation</loc>
<lastmod>2026-02-16T20:52:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/validating-third-party-sboms-oem-supplier-trust</loc>
<lastmod>2026-02-16T20:52:11.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-pen-testing-is-required-for-cybersecurity-compliance</loc>
<lastmod>2026-02-16T20:52:13.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/risk-based-security-how-to</loc>
<lastmod>2026-02-16T20:52:14.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/what-is-the-connected-vehicle-rule</loc>
<lastmod>2026-02-16T20:52:16.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/cvr-specific-authorization</loc>
<lastmod>2026-02-16T20:52:17.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/will-the-doc-enforce-the-cvr-strictly-from-day-one</loc>
<lastmod>2026-02-16T20:52:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/precision-over-panic-how-to-focus-on-real-risk-for-cra-compliance</loc>
<lastmod>2026-02-16T20:52:20.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/sboms-key-to-meeting-compliance-capabilities</loc>
<lastmod>2026-02-16T20:52:21.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-ai-supply-chain-risk-shape-iot-security</loc>
<lastmod>2026-02-16T20:52:23.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-you-cant-just-approve-a-supplier-under-cvr</loc>
<lastmod>2026-02-16T20:52:24.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos//artificial-adversary-compliance-connected-devices</loc>
<lastmod>2026-02-19T22:12:20.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-to-exclude-components-under-the-cvr</loc>
<lastmod>2026-02-16T20:52:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-finite-state-unifies-security-workflows</loc>
<lastmod>2025-12-14T02:05:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/hardcoded-credentials-the-risks-developers-leave-behind</loc>
<lastmod>2026-02-16T20:52:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-sboms-matter-for-cra</loc>
<lastmod>2026-02-16T20:52:30.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/iot-security-is-improving-risk-is-still-growing</loc>
<lastmod>2026-02-16T20:52:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/what-makes-a-quality-sbom</loc>
<lastmod>2026-02-16T20:52:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/iot-security-advice-assume-breach-plan-for-what-comes-next</loc>
<lastmod>2026-02-16T20:52:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/most-iot-breaches-are-trust-failures</loc>
<lastmod>2026-02-16T20:52:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/when-should-you-run-a-pen-test</loc>
<lastmod>2026-02-16T20:52:37.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/making-legacy-software-carve-out-work-cvr</loc>
<lastmod>2026-02-16T20:52:38.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/cra-compliance-vs-industry-standards</loc>
<lastmod>2026-02-16T20:52:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/navigating-the-complexity-of-iot-device-vulnerability-video</loc>
<lastmod>2025-12-14T02:05:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/what-a-unified-software-risk-picture-looks-like</loc>
<lastmod>2026-02-16T20:52:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/cra-assessments-shadow-product-security</loc>
<lastmod>2026-02-16T20:52:42.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/the-hidden-risk-in-iot-insecure-cloud-connections</loc>
<lastmod>2026-02-16T20:52:44.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/finite-state-benefits-for-regulated-industries</loc>
<lastmod>2026-02-16T20:52:45.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-silos-impact-vulnerability-compliance-management</loc>
<lastmod>2026-02-16T20:52:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/layered-approach-cra-compliance-analysis-methods</loc>
<lastmod>2026-02-16T20:52:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-to-leverage-sboms-to-reduce-software-supply-chain-risk</loc>
<lastmod>2026-02-16T20:52:49.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/security-program-compliance-expectations</loc>
<lastmod>2026-02-16T20:52:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/build-for-failure-not-perfection</loc>
<lastmod>2026-02-16T20:52:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/webinar-sans-ics-2022-product-security-meets-detection-and-response</loc>
<lastmod>2026-02-16T20:52:54.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-disruptive-is-the-connected-vehicle-rule</loc>
<lastmod>2026-02-16T20:52:55.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/top-3-iot-security-gaps-today</loc>
<lastmod>2026-02-16T20:52:56.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/cra-retroactive-vulnerability-management</loc>
<lastmod>2026-02-16T20:52:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/secure-product-lifecycle-journey</loc>
<lastmod>2026-02-16T20:52:59.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/the-hidden-cost-of-being-first-to-market</loc>
<lastmod>2026-02-16T20:53:01.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/advice-for-building-scalable-product-security-programs</loc>
<lastmod>2026-02-16T20:53:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/cra-coordinated-vulnerability-disclosure</loc>
<lastmod>2026-02-16T20:53:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/epss-reachability-roi-security-decision-making</loc>
<lastmod>2026-02-16T20:53:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-linking-sbom-vulnerabilities-and-compliance-matters</loc>
<lastmod>2026-02-16T20:53:07.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-cybersecurity-isnt-one-size-fits-all</loc>
<lastmod>2026-02-16T20:53:08.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/security-by-design</loc>
<lastmod>2026-02-16T20:53:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/ai-and-the-future-of-sboms</loc>
<lastmod>2026-02-17T20:55:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/ai-autonomy-vs-oversight</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/ai-hallucinations-explained</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/ai-the-secret-weapon-for-product-security-compliance-at-finite-state</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/ais-context-challenge</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/ais-role-in-navigating-global-product-security-regulations</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/balancing-security-and-ai</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/beyond-the-scan-how-ai-adds-real-value-in-product-security-workflows</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/closing-security-gaps-for-cra-compliance</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/finding-clarity-and-focus-for-complex-embedded-system-security</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/finite-state-vs-legacy-tooling</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/finite-states-policy-engine-for-tailored-security-decisions</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-ai-is-slashing-the-workload-in-software-supply-chain-security</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-ai-transforms-vulnerability-and-exploit-detection</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-finite-state-analyzes-every-layer-of-your-firmware</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-finite-state-is-supercharging-security-with-ai</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-finite-state-reduces-false-positives</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-finite-state-tackles-binary-analysis-challenges</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-to-get-meaningful-risk-scores-from-ai</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/how-tool-enabled-ai-is-transforming-cybersecurity</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/integrating-finite-state-into-modern-cicd-pipelines</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/modern-irt-seeing-the-unseen-in-firmware-with-a-multi-layered-security-approach</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/modernizing-software-supply-chain-security</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/navigating-software-security-and-compliance-challenges</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/sbom-verification-ensuring-quality-trust-in-final-software-builds</loc>
<lastmod>2025-12-14T02:05:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/sboms-ai-and-the-real-work</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/shifting-security-left-across-your-organization</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/smarter-ways-to-prioritize-vulnerabilities</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/speeding-up-remediation</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/spotting-sbom-flaws</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/the-biggest-misconception-in-supply-chain-security</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/the-hidden-risk-of-precompiled-binaries</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/unlock-your-systems-secrets</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/untangling-supply-chains</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-finding-software-vulnerabilities-still-needs-more-than-ai-alone</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-security-still-needs-tools-context-and-smart-integration</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/why-security-submissions-are-critical-for-connected-medical-devices</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/resources/videos/zero-trust-iot-prepare-for-breaches-verify-everything</loc>
<lastmod>2025-12-14T02:05:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/automotive-cybersecurity-detroit</loc>
<lastmod>2026-02-11T22:40:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/automotive-cybersecurity-connectivity-and-sdv-europe-2025</loc>
<lastmod>2026-02-19T22:12:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/auto-isac-europe</loc>
<lastmod>2026-02-11T22:40:38.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/imc-iot-days-spring-focus-on-low-power</loc>
<lastmod>2026-02-11T22:40:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/connected-vehicle-webinar</loc>
<lastmod>2026-02-19T22:12:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/embedded-world-north-america-2025</loc>
<lastmod>2026-02-11T22:40:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/securing-enterprise-iot-blind-spots</loc>
<lastmod>2026-02-11T22:40:42.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/the-future-of-iot-security</loc>
<lastmod>2026-02-19T22:12:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/iot-days-summer-security-by-design-default</loc>
<lastmod>2026-02-11T22:40:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/escar-europe-2025</loc>
<lastmod>2026-02-11T22:40:47.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/escar-usa</loc>
<lastmod>2026-02-11T22:40:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/focus-on-real-risk-for-cra-compliance-webinar</loc>
<lastmod>2026-02-19T22:12:38.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/navigating-the-regulatory-maze</loc>
<lastmod>2026-02-19T22:12:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/ces-2026</loc>
<lastmod>2026-02-11T22:40:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/mwc-barcelona-2026</loc>
<lastmod>2026-02-11T22:40:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/vulncon-2025</loc>
<lastmod>2026-02-11T22:40:53.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/ces-2025</loc>
<lastmod>2026-02-11T22:40:55.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/rsa-2026</loc>
<lastmod>2026-03-20T17:28:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/embedded-world-mar-26</loc>
<lastmod>2026-02-19T22:12:43.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/s4-26</loc>
<lastmod>2026-02-11T22:40:56.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/health-isac-spring-summit-2026</loc>
<lastmod>2026-03-17T18:32:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/automotive-cybersecurity-summit-detroit-mar-26</loc>
<lastmod>2026-02-19T22:12:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/rsac25-appsec-village</loc>
<lastmod>2026-02-11T22:40:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/auto-isac-annual-summit-usa-2025</loc>
<lastmod>2026-02-11T22:40:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/wi-fi-world-congress26</loc>
<lastmod>2026-03-17T18:00:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/agentic-ai-vegas-2025</loc>
<lastmod>2026-02-19T22:12:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/defcon-33</loc>
<lastmod>2025-12-14T02:04:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/infosec-europe-2025</loc>
<lastmod>2025-12-14T02:04:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/securing-product-lifecycle-webinar-2025</loc>
<lastmod>2025-12-14T02:04:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/vulncon-2026</loc>
<lastmod>2026-03-17T16:29:26.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/s4-25-conference</loc>
<lastmod>2025-12-14T02:04:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/events/eu-cyber-acts-conference-2026</loc>
<lastmod>2026-02-13T17:40:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/soc-2-certification</loc>
<lastmod>2026-02-19T22:10:49.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/beth-linker-ai4-panel</loc>
<lastmod>2026-02-19T22:10:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-appoints-chris-overton-as-evp-of-engineering</loc>
<lastmod>2026-02-19T22:10:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-gartner-market-guide-medical-device-risk-management</loc>
<lastmod>2026-02-19T22:10:53.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/quectel-finite-state-certification-masterclass</loc>
<lastmod>2026-02-19T22:10:54.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/connected-vehicle-rule-webinar-announcement</loc>
<lastmod>2026-02-19T22:10:55.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/autosar-capabilities-phase-one-launch</loc>
<lastmod>2026-02-19T22:10:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-announces-webinar-on-modern-iot-security-scanning-strategies</loc>
<lastmod>2026-02-19T22:10:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-appoints-doc-mcconnell-head-of-policy-compliance</loc>
<lastmod>2026-02-19T22:10:59.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/ces-2026-cybersecurity-panel-matt-wyckhouse</loc>
<lastmod>2026-02-19T22:11:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-to-sponsor-vulncon-2025</loc>
<lastmod>2026-02-19T22:11:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/beth-linker-keynote-automotive-cybersecurity-europe-2025</loc>
<lastmod>2026-02-19T22:11:03.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-to-sponsor-auto-isac-europe-2025</loc>
<lastmod>2026-02-19T22:11:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-announces-webinar-secure-product-development-for-iot</loc>
<lastmod>2026-02-19T22:11:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-sponsor-appsec-village-at-rsac-2025</loc>
<lastmod>2026-02-19T22:11:06.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/emea-webinar-cra-compliance-precision-risk-management</loc>
<lastmod>2026-02-19T22:11:07.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/reachability-analysis-launch</loc>
<lastmod>2026-02-19T22:11:08.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-announces-webinar-cross-framework-compliance-strategies</loc>
<lastmod>2026-02-19T22:11:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/executive-boardroom-cabana-experience-s4x26</loc>
<lastmod>2026-02-19T22:11:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-participation-embedded-world-scavenger-hunt</loc>
<lastmod>2026-02-19T22:11:11.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-gartner-hype-cycle-application-security-2025</loc>
<lastmod>2026-02-19T22:11:12.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-gartner-hype-cycle-ai-cybersecurity-2025</loc>
<lastmod>2026-02-19T22:11:13.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/autonomous-product-security-os-launch</loc>
<lastmod>2026-02-19T22:11:14.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-appoints-sharon-hagi-chief-security-officer</loc>
<lastmod>2026-02-19T22:11:15.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-launches-ai-unpacking-evaluation-agent</loc>
<lastmod>2026-02-24T22:40:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-enhanced-dashboards-release</loc>
<lastmod>2026-02-19T22:11:17.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/dario-lobozzo-bcc2025-telecom-security-panel</loc>
<lastmod>2026-02-19T22:11:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-sponsors-appsec-village-def-con-33</loc>
<lastmod>2026-02-19T22:11:19.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/ai-product-launch-finalist-2025</loc>
<lastmod>2026-02-19T22:11:20.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/matt-wyckhouse-sbom-security-panel-embedded-world-europe</loc>
<lastmod>2026-02-19T22:11:21.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/introducing-github-actions-marketplace-apps</loc>
<lastmod>2026-02-19T22:11:26.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/auto-resolve-feature-announcement</loc>
<lastmod>2026-02-19T22:11:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/beth-linker-automotive-iq-top-20-voices-automotive-cybersecurity-2026</loc>
<lastmod>2026-02-27T19:09:21.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/2021-tag-cyber-security-annual-4th-quarter-edition</loc>
<lastmod>2026-02-19T22:11:28.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/announcing-emea-expansion</loc>
<lastmod>2026-02-19T22:11:29.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/announcing-somos-partnership</loc>
<lastmod>2026-02-19T22:11:30.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/automated-zero-day-detection-for-connected-devices</loc>
<lastmod>2026-02-19T22:11:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/commercial-talent</loc>
<lastmod>2026-02-19T22:11:32.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/customer-spotlight-johnson-controls-named-iot-partner-ecosystem-of-the-year-in-2021-iot-breakthrough-awards</loc>
<lastmod>2026-02-19T22:11:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/cybersecurity-breakthrough-awards-2021</loc>
<lastmod>2026-02-19T22:11:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/device-manufacturers</loc>
<lastmod>2026-02-19T22:11:35.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/did-ripple20-raise-a-false-alarm-finite-state-finds-discrepancies</loc>
<lastmod>2026-02-19T22:11:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/exploit-intelligence-capability</loc>
<lastmod>2026-02-19T22:11:37.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/exploitable-vulnerabilities-that-expose-healthcare-facilities-surged-nearly-60-since-2022</loc>
<lastmod>2026-02-19T22:11:38.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-acquires-mergebase-to-form-a-powerhouse-in-application-security</loc>
<lastmod>2026-02-19T22:11:39.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-adds-gün-akkor-kirk-appelman</loc>
<lastmod>2026-02-19T22:11:40.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-adds-larry-pesce-to-scale-guidance-and-services-for-customer-product-security-teams</loc>
<lastmod>2026-02-19T22:11:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-adds-thomas-bain</loc>
<lastmod>2026-02-19T22:11:43.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-adds-three-veteran-cybersecurity-executives</loc>
<lastmod>2026-02-19T22:11:44.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-and-device-authority-announce-partnership-to-ensure-security-of-iot-software-supply-chain</loc>
<lastmod>2026-02-19T22:11:45.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-and-rkvst-announce-partnership-to-accelerate-software-transparency</loc>
<lastmod>2026-02-19T22:11:46.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-and-security-risk-advisors-sra-announce-strategic-partnership-to-drive-enhanced-cybersecurity-for-connected-devices</loc>
<lastmod>2026-02-19T22:11:48.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-boosts-velocity-and-depth-of-iot-vulnerability-discovery-through-new-advanced-search</loc>
<lastmod>2026-02-19T22:11:49.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-continues-to-expand-executive-team</loc>
<lastmod>2026-02-19T22:11:50.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-introduces-next-generation-platform-for-software-supply-chain-security</loc>
<lastmod>2026-02-19T22:11:51.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-raises-12-5-million-to-solve-one-of-the-biggest-problems-in-cybersecurity</loc>
<lastmod>2026-02-19T22:11:53.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-raises-20-million-growth-round</loc>
<lastmod>2026-02-19T22:11:53.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-responds-to-huawei-critiques-stands-by-assessment-huawei-products-contain-significant-vulnerabilities</loc>
<lastmod>2026-02-19T22:11:54.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-series-b</loc>
<lastmod>2026-02-19T22:11:56.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-team-sees-rapid-growth-amidst-global-uncertainty</loc>
<lastmod>2026-02-19T22:11:57.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-unveils-new-partnership-program</loc>
<lastmod>2026-02-19T22:11:58.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/finite-state-veracode-partner</loc>
<lastmod>2026-02-19T22:11:59.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/first-automated-risk-scoring-capability-for-iot-devices</loc>
<lastmod>2026-02-19T22:12:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/multiple-awards-recognize-finite-state-for-innovation-in-iot-and-security-automation</loc>
<lastmod>2026-02-19T22:12:01.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/new-coo-cpo-join-finite-state</loc>
<lastmod>2026-02-19T22:12:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/new-podcast-product-security</loc>
<lastmod>2026-02-19T22:12:03.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/new-solution-for-asset-owners</loc>
<lastmod>2026-02-19T22:12:04.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/ponemon-product-security-report</loc>
<lastmod>2026-02-19T22:12:05.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/report-finds-cybersecurity-vulnerabilities-embedded-within-huawei-devices</loc>
<lastmod>2026-02-19T22:12:06.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/scmagazine-huawei-research-finite-state</loc>
<lastmod>2026-02-19T22:12:07.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/security-weekly-podcast</loc>
<lastmod>2026-02-19T22:12:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/news/wall-street-journal-huawei-research-finite-state</loc>
<lastmod>2026-02-19T22:12:10.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/industry/medical-devices</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/platform</loc>
<lastmod>2026-03-17T16:46:25.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/terms-of-use</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/services/certification-accelerator</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/marketing-demo</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/use-cases/automated-threat-modeling</loc>
<lastmod>2026-02-16T17:02:55.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/use-cases/compliance-automation</loc>
<lastmod>2026-03-17T16:46:30.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/use-cases/psirt-rapid-vulnerability-response</loc>
<lastmod>2026-02-16T17:03:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/use-cases/release-readiness-security-gating</loc>
<lastmod>2026-03-17T16:46:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/use-cases/security-requirements-verification</loc>
<lastmod>2026-02-16T17:03:06.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/industry/connected-device-manufacturers</loc>
<lastmod>2026-02-16T15:41:34.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/marketing-template-demo</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/request-demo</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/customer-terms-and-conditions</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/thank-you</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/product-tour</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/media-inquiries</loc>
<lastmod>2026-03-30T18:46:53.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/services</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/contact-sales</loc>
<lastmod>2026-02-19T03:16:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/support</loc>
<lastmod>2026-02-27T20:09:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/industry/energy-utilities</loc>
<lastmod>2026-02-13T23:15:16.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/partners</loc>
<lastmod>2026-02-27T18:45:26.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/about</loc>
<lastmod>2026-03-04T17:47:01.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/platform/integrations</loc>
<lastmod>2026-02-26T20:15:33.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/industry/connected-vehicles</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/platform/automated-evidence-backed-compliance</loc>
<lastmod>2026-02-16T17:03:08.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/contact</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/services/penetration-testing</loc>
<lastmod>2026-02-16T17:03:14.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/event-lead-scanner</loc>
<lastmod>2026-02-13T16:55:50.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/privacy-policy</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/industry/government</loc>
<lastmod>2026-02-16T17:03:22.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/eu-cyber-resilience-act</loc>
<lastmod>2026-02-16T17:03:36.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/industry/industrial-backup</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/compliance-consultation</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/platform/exploitability-based-prioritization</loc>
<lastmod>2026-02-16T17:03:47.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/platform/design-time-architecture-security</loc>
<lastmod>2026-03-17T16:46:27.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/industry/industrial</loc>
<lastmod>2026-02-16T17:04:00.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/services/strategic-advisory</loc>
<lastmod>2026-02-12T23:17:03.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/platform/ground-truth-inventory</loc>
<lastmod>2026-02-13T00:32:41.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/pricing</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/use-cases/kitchen-sink</loc>
<lastmod>2026-02-16T17:04:02.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/use-cases/automated-pen-test-planning</loc>
<lastmod>2026-02-16T17:04:06.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/use-cases/design-to-build-traceability</loc>
<lastmod>2026-02-16T17:04:09.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/use-cases/reachability-driven-vulnerability-prioritization</loc>
<lastmod>2026-03-17T16:46:31.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/use-cases/sbom-vex-lifecycle-management</loc>
<lastmod>2026-02-16T17:04:18.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/services/training</loc>
<lastmod>2026-02-16T17:04:24.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/backup/use-cases/psirt</loc>
<lastmod>2026-02-12T19:46:52.000Z</lastmod>
</url>
<url>
<loc>https://finitestate.io/cra</loc>
<lastmod>2026-03-27T22:01:39.000Z</lastmod>
</url>
</urlset>
