As AI accelerates both innovation and cyberattacks, federal, defense, and OT systems now face an overwhelming...
Podcasts
Explore our latest podcast, Exploited: The Cyber Truth, where we expose real-world cyber threats and the strategies used to stop them—featuring bold conversations with top experts protecting critical infrastructure. You can also revisit episodes of our original series, Lessons from the School of Security Hard Knocks, where leaders reflect on hard-earned lessons from the frontlines of cybersecurity.
Designing Security into Life-Critical Devices: Where Innovation Meets Regulation
As connected healthcare evolves, medical device cybersecurity has become inseparable from patient safety. In...
How Generative AI Is Addressing Warfighter Challenges
In today’s fast-paced defense environment, speed and intelligence win battles before they begin. In this...
What the 2025 SBOM Minimum Elements Mean for Software Supply Chain Security
The updated 2025 SBOM Minimum Elements from CISA and DHS introduces new guidance on what data and context...
Collaboration in Cyberspace with Madison Horn
In this episode of Exploited: The Cyber Truth, host Paul Ducklin welcomes Madison Horn, National Security &...
Risk Reduction at the Core: Securing the Firmware Supply Chain
Firmware forms the foundation of all embedded and connected devices—but it’s often overlooked in cybersecurity...
Get In Touch With RunSafe
Get in touch with RunSafe to learn how our automated cybersecurity solutions can protect your embedded systems, reduce vulnerabilities, and ensure robust, continuous security for your mission-critical software.





