Finite State’s compliance mapping feature allows companies to confirm if their products meet compliance

Many companies need to meet compliance requirements or face hefty fines from their governing organizations. Finite State recently introduced a compliance mapping function so those companies can quickly confirm whether they’re able to pass an audit or a… Continue reading Finite State’s compliance mapping feature allows companies to confirm if their products meet compliance

Finite State’s binary analysis enhances automated zero-day vulnerability detection

Vulnerabilities in the software supply chain are costing device manufacturers business. Threats like Treck TCP/IP and ThroughTek Kalay P2P SDK continue to emerge, and according to a recent Ponemon Institute report, nearly 60% of organizations have lost… Continue reading Finite State’s binary analysis enhances automated zero-day vulnerability detection

Finite State’s enhanced search capability enables users to gain full visibility into their IoT devices

Finite State has released a search function for its platform that allows users to gain full visibility into their embedded devices and identify whether a known vulnerability is present. Internet of Things (IoT) devices have been black boxes whose secur… Continue reading Finite State’s enhanced search capability enables users to gain full visibility into their IoT devices

Organizations losing business due to connected product security concerns

59% of executives with cybersecurity decision-making responsibility at large and mid-sized companies say that their organizations have lost business due to product security concerns for connected devices and embedded systems, according to a Ponemon Ins… Continue reading Organizations losing business due to connected product security concerns

Helping researchers with IoT firmware vulnerability discovery

John Toterhi, a security researcher with IoT security company Finite State, believes that many of the security problems plaguing IoT devices are solvable problems through transparency. “Manufacturers who make their firmware public and follow GPL … Continue reading Helping researchers with IoT firmware vulnerability discovery