Finite State's Avatar

Finite State

@finite-state.bsky.social

Finite State is the leading provider of product cyber security solutions for connected devices and embedded systems, including IoT, medical devices, and OT/ICS.

13 Followers  |  38 Following  |  144 Posts  |  Joined: 08.01.2025  |  2.07

Latest posts by finite-state.bsky.social on Bluesky

Video thumbnail

Most scanners scratch the surface.
Finite State goes deeperβ€”dissecting firmware, source code & SBOMs to flag hidden secrets, weak configs & zero-days, enriched with 200+ threat intel feeds.

Cut through noisy scan results β†’
finitestate.io/resources/vu...

#IoTSecurity #VulnerabilityManagement

11.08.2025 16:48 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Join Beth Linker for the panel β€œ#AgenticAI: Redefining Decision-Making, Trust, & Liability” at #Ai4.

Dive into how autonomous AI systems are transforming decision-making & what it means for accountability & trust in critical industries.

t.co/sNpbVDRqdr

#ResponsibleAI

08.08.2025 15:18 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Get ready, #AppSecVillage, IoT Pentest Blitz is back!

Think you have what it takes to out-hack your peers? Come & test your skills:
πŸ”Ή August 8: 11am - 3pm
πŸ”Ή August 9: 1pm - 5pm

See you there!

#DEFCON #AppSecVillage #IoT #PenTesting #CyberSecurity

07.08.2025 16:11 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

🚨 Webinar Alert

Join leading voices in #AutomotiveCybersecurity, policy & law to unpack how the #ConnectedVehicleRule is reshaping the industry & what #OEMs & suppliers must do to stay compliant & competitive.

Register now & submit your questions πŸ‘‡
info.finitestate.io/connected-ve...

#Automotive

06.08.2025 21:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Think you can out-hack the hackers?

Join us in DEF CON’s #AppSecVillage for IoT Pen-test Blitz to prove it!

Game Times:
πŸ”Ή Friday, August 8: 11 AM – 3 PM
πŸ”Ή Saturday, August 9: 3 – 5 PM

Reserve your spot πŸ‘‰ info.finitestate.io/defcon-33

#DEFCON33 #IoTSecurity

04.08.2025 16:07 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

🎲 Finite State is bringing IoT Pentest Blitz to #DEFCON33 in the AppSec Village!

Join our high-stakes card game & test your skills building & breaking IoT exploit chains.

Plus meet the team to talk supply chain security! info.finitestate.io/defcon-33

#AppSecVillage #IoTSecurity

31.07.2025 21:53 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Automatically resolve unreachable findings with a single click, update VEX status & free your team to focus on real threats with Auto-Resolve.

No more manual triage. Just clarity on what's reachable. Learn more πŸ‘‰ finitestate.io/blog/auto-re...

#IoTSecurity #VulnerabilityManagement

31.07.2025 17:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
OSS Trojan Horse: The Hidden Risks of Open Source in Embedded Systems Open source powers IoT, but hidden components and transitive risks expose your products. Learn how to secure what you didn’t even know you shipped.

Open-source software powers innovation but it’s also a hidden risk.

Our latest blog explores how to truly secure your OSS supply chain. Take a look πŸ‘‰ finitestate.io/blog/secure-...

#CyberSecurity #OpenSourceSecurity #SBOM #IoTSecurity #ProductSecurity #SoftwareSupplyChain

30.07.2025 19:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Simply dropping an #SBOM into an LLM & asking, β€œIs this secure?” won’t cut it.

#AI models β€” just like human experts β€” need context to deliver meaningful risk assessments.

The richer the context you provide, the better the AI’s outputs.

#CyberSecurity #LLMs #ProductSecurity

30.07.2025 16:06 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Securing IoT products demands deep #BinaryAnalysis. Why? Because today’s IoT software is a tangled web of global supply chains, legacy code & opaque binaries.

In our Security Short, Edwin makes it clear: to protect IoT products, you have to go deeper than the surface.

#IoT

29.07.2025 23:51 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Something big is coming to #ProductSecurity.

Matt & Tim will be on the ground at #BlackHatUSA sharing the next evolution of connected device security. Schedule a time to meet with us & get the inside story before anyone else. πŸ‘‡

info.finitestate.io/finite-state...

#IoTSecurity #Cybersecurity

29.07.2025 18:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Building a Compliance-Ready DevSecOps Pipeline for IoT Systems Build a compliance-ready DevSecOps pipeline for IoT & embedded systems with automated security, SBOMs, and CRA/RED/NIST-aligned tools.

DevSecOps β‰  one-size-fits-all.

IoT & connected products demand unique DevSecOps workflows for compliance, binary analysis, & SBOMs.

Learn how to adapt DevSecOps for IoT πŸ‘‰
finitestate.io/blog/devseco...

#CyberSecurity #DevSecOps #IoTSecurity #ProductSecurity #SoftwareSupplyChain

23.07.2025 21:00 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Your code. Vendor code. Their vendor’s code.

Finite State inspects everything inside your binaries. No blind spots.

#SBOM #SupplyChainSecurity #ProductSecurity

23.07.2025 16:11 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

β€œIoT PenTest Blitz” is coming to #DEFCON32!

Join us in the #AppSecVillage to:
πŸ” Analyze real firmware
πŸ› οΈ Build your attack chain
πŸ† Rack up points like a pro

Swing by & show us what you’ve got.

#IoTSecurity #PenTestBlitz #FirmwareSecurity #Cybersecurity

22.07.2025 19:05 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

#LLMs aren't magic. True #ProductSecurity still relies on specialized tools but the real power comes when LLMs & trad tools work together.

Feed LLMs the data, give it context & guide it with good questions, & it can deliver incredible insights that transform security workflows.

21.07.2025 23:10 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Precompiled binaries are a black box risk. Without source code, you’re left with vendor docs & guesswork.

In our "Security Short", Edwin stresses that the only way to truly understand what’s inside precompiled binaries is through #BinaryAnalysis.

Visibility matters.

18.07.2025 22:15 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

🚨 #EURED cybersecurity requirements go live Aug 1st. Don't let it delay your launch.

Finite State delivers
⚑️ 10-day turnaround
πŸ” Binary-native analysis
βœ… CRA-ready #SBOM
πŸ“„ Docs your NB will accept

Fast-track your compliance today πŸ‘‡
finitestate.io/request-a-co...

#EN18031

18.07.2025 18:44 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Many manufacturers think they’re compliant if they generate an SBOM. But that’s just step one.

Our latest blog explains what’s beyond the #SBOM for true product security & compliance. Take a look πŸ‘‰ finitestate.io/blog/beyond-...

#ProductSecurity #IoTSecurity #SoftwareSupplyChain

18.07.2025 15:10 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Think Your Source Code Is Secure? Check Your Firmware First Attackers target what runs, not what’s written. Learn why binary-level firmware analysis is essential for real IoT security and regulatory compliance.

Source code scans β‰  full security.

Firmware hides risks SCA tools can’t see: proprietary binaries, vendor code, secrets, misconfigs.

Discover why firmware analysis is essential for secure connected products πŸ‘‰ finitestate.io/blog/firmwar...

#FirmwareSecurity #IoTSecurity

17.07.2025 16:17 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Opaque Vendors: How to Secure Components Without Source Code Access Learn how to secure IoT components from opaque vendors without source code access, using binary analysis and penetration testing for compliance.

Opaque vendors are the silent threat lurking in your supply chain.

Edwin's been exploring how to break through the opacity in his latest blog.

If opaque vendors keep you up at night, this article is for you.

πŸ”— finitestate.io/blog/securin...

#IoTSecurity #SupplyChainSecurity

16.07.2025 17:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

AI doesn’t just detect vulnerabilities β€” it helps security teams triage and fix them.

In our latest Security Short, Matt Wyckhouse shares how LLMs cut human effort by 90% in software supply chain security.

#CyberSecurity #AI

16.07.2025 16:36 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

One of the most dangerous misconceptions in product security? Thinking upstream vulnerabilities β€œaren’t your problem.”

Customers don’t care whose fault it is when products are vulnerable & it’s a dangerous bet to assume upstream flaws won’t impact you.

#ProductSecurity

15.07.2025 21:20 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

⏳24 Hours to Go

Join us live tomorrow for a webinar on building a SPDL that aligns with multiple regulations at once.

Can’t make it? Register anyway for the on-demand recording πŸ‘‰https://info.finitestate.io/securing-the-product-lifecycle

#IoTCompliance #CyberRegulations

15.07.2025 16:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Finite State’s Reachability Analysis shows which vulns in your firmware are truly exploitable so you can fix what matters.

βœ… Slash time spent triaging false positives
βœ… Scale security even for proprietary, encrypted or RTOS-based firmware

Learn more πŸ‘‰ finitestate.io/request-demo

14.07.2025 16:36 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Hidden threats often lurk in unseen places.

Full-scope #PenTesting uncovers missing controls, insecure ops, or debug featuresβ€”whether 1st- or 3rd-party.

At Finite State, we believe security demands a holistic view. Are you looking deep enough?

#CyberSecurity #ProductSecurity

14.07.2025 16:17 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Building a Modern IoT Security Stack: Securing From Source to Firmware Don’t just scan your sourceβ€”secure your full IoT stack. Learn how to build a modern, layered security strategy from code to firmware and beyond.

We explored what a modern #IoTsecurity stack looks like & how to

βœ…Move beyond patchwork tools to integrated security workflows
βœ…Gain deep visibility into firmware, binaries & #SoftwareSupplyChains
βœ…Align security investment with evolving global regs

πŸ”— finitestate.io/blog/buildin...

11.07.2025 22:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

60% of IoT attacks come from unpatched flaws but it’s likely closer to 90%.

#IoTSecurity isn’t a one-time fix. Updates & secure-by-default designs are essential & now required by new regulations.

Tackle this challenge head-on with Finite State πŸ‘‰ finitestate.io/request-demo

11.07.2025 15:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Request a Compliance Consultation Take advantage of industry-leading services designed to help organizations navigate evolving regulations, enhance product security, and mitigate cyber threats.

🚨 EU RED cyber rules hit Aug 1, 2025.

Finite State’s fast-track services:

⚑ 10-day turnaround
πŸ“„ SBOMs + CRA-ready evidence
πŸ› οΈ Root-cause remediation help

Don’t risk delays. Book a compliance consult β†’ finitestate.io/request-a-co...

#CyberSecurity #EURED #IoTSecurity

10.07.2025 21:41 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Don't miss our expert-led session on building compliance into your product development from the ground up for
- A repeatable, regulation-aligned #SPDL framework
- Insights from seasoned practitioners
- Tools to simplify SBOM & remediation workflows

Register now πŸ‘‰ hubs.ly/Q03tCPBl0

10.07.2025 16:41 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

#AI went from basic tasks to wielding tools in just a year.

The result?

An unprecedented opportunity to automate time-consuming work in cybersecurity & #SoftwareSupplyChainSecurity, freeing humans to focus on the truly critical problems.

#CyberSecurity #ProductSecurity #LLMs t.co/LKAqvsZwcQ

09.07.2025 22:39 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@finite-state is following 20 prominent accounts