Finite State

Finite State’s compliance mapping feature allows companies to confirm if their products meet compliance
Many companies need to meet compliance requirements or face hefty fines from their governing organizations. Finite State recently introduced a compliance mapping function so …

Finite State hires Gün Akkor as CTO and Kirk Appelman as EVP of Sales
To secure devices with complex supply chains in an expanding threat landscape, Finite State has added Gün Akkor as its chief technology officer and Kirk Appelman as executive …

Finite State’s binary analysis enhances automated zero-day vulnerability detection
Vulnerabilities in the software supply chain are costing device manufacturers business. Threats like Treck TCP/IP and ThroughTek Kalay P2P SDK continue to emerge, and …

Finite State’s enhanced search capability enables users to gain full visibility into their IoT devices
Finite State has released a search function for its platform that allows users to gain full visibility into their embedded devices and identify whether a known vulnerability …

Organizations losing business due to connected product security concerns
59% of executives with cybersecurity decision-making responsibility at large and mid-sized companies say that their organizations have lost business due to product security …

Helping researchers with IoT firmware vulnerability discovery
John Toterhi, a security researcher with IoT security company Finite State, believes that many of the security problems plaguing IoT devices are solvable problems through …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility