Finite State
![Appointments](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111336/appointments_1200-400x200.jpg)
Finite State hires Gün Akkor as CTO and Kirk Appelman as EVP of Sales
To secure devices with complex supply chains in an expanding threat landscape, Finite State has added Gün Akkor as its chief technology officer and Kirk Appelman as executive …
![security platform](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092552/security_platforma_1200-400x200.jpg)
Finite State’s binary analysis enhances automated zero-day vulnerability detection
Vulnerabilities in the software supply chain are costing device manufacturers business. Threats like Treck TCP/IP and ThroughTek Kalay P2P SDK continue to emerge, and …
![security platform](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092552/security_platforma_1200-400x200.jpg)
Finite State’s enhanced search capability enables users to gain full visibility into their IoT devices
Finite State has released a search function for its platform that allows users to gain full visibility into their embedded devices and identify whether a known vulnerability …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102855/stop-400x200.jpg)
Organizations losing business due to connected product security concerns
59% of executives with cybersecurity decision-making responsibility at large and mid-sized companies say that their organizations have lost business due to product security …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
Helping researchers with IoT firmware vulnerability discovery
John Toterhi, a security researcher with IoT security company Finite State, believes that many of the security problems plaguing IoT devices are solvable problems through …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD