In this episode of Exploited: The Cyber Truth, host Paul Ducklin and RunSafe Security CEO Joe Saunders explore a...
Podcasts
Explore our latest podcast, Exploited: The Cyber Truth, where we expose real-world cyber threats and the strategies used to stop them—featuring bold conversations with top experts protecting critical infrastructure. You can also revisit episodes of our original series, Lessons from the School of Security Hard Knocks, where leaders reflect on hard-earned lessons from the frontlines of cybersecurity.
What Drivers Really Think About Connected Car Safety
Cybersecurity isn’t just an automotive industry concern, it’s becoming a consumer expectation. RunSafe...
When IT Falls, OT Follows: Inside the SharePoint Breach with Ron Reiter
The explosive SharePoint vulnerabilities (CVE-2025-53770 and CVE-2025-53771) are already wreaking havoc across...
Protecting Smart Factories from Smart Attackers
Smart factories promise efficiency, automation, and global competitiveness—but they also expand the attack surface...
After DEF CON: What the Maritime Hacking Village Revealed About Real-World ICS Risk
DEF CON 33 made history with its first-ever Maritime Hacking Village, bringing together hackers, engineers, and...
Software Assurance at Mission Speed: Securing Code Without Delaying Programs
In this episode of Exploited: The Cyber Truth, RunSafe Security CEO Joe Saunders joins host Paul Ducklin to explore...
Get In Touch With RunSafe
Get in touch with RunSafe to learn how our automated cybersecurity solutions can protect your embedded systems, reduce vulnerabilities, and ensure robust, continuous security for your mission-critical software.