Supply Chain Cybersecurity: Matt Wyckhouse
Finite State
“We can take the software out of that device, analyze it, and tell you where it came from, concretely. We don’t need to take a vendor’s word for it. We can tell you what vulnerabilities are in there.”










