RunSafe Security
  • Product
    • Platform Overview
      • RunSafe Identify – SBOM generation, license compliance & vuln identification
      • RunSafe Protect – Automated runtime code protection
      • RunSafe Monitor – Runtime monitoring solution
    • Integrations & Supported Platforms
      • Product Updates
      • Standards & Compliance
      • Platform Pricing
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Open Source License Compliance
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
  • Industries
    • Automotive
    • Medical Device
    • Aerospace and Defense
    • Industrial Automation
    • High-Tech Manufacturing
    • Energy
    • Railway
  • About Us
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
      • Learn
        • Blog
        • Podcasts
        • Webinars
        • Videos
        • Events
        • FAQ
      • Explore Solutions
        • Case Studies
        • Whitepapers
        • Reports
        • Total Cost of Ownership Calculator
        • Download Resources
        • Product Updates
      • Use Cases
        • Embedded Device Security
        • Software Supply Chain Security
        • OT/ICS Device Security
        • Military Embedded Systems
        • Advanced Driver Assistance Systems
        • Electronic Control Units
        • Connected Vehicle Security
        • Medical Device FDA Compliance
        • Secure Flight Control Systems
  • TALK TO EXPERT
  • Log In
%1$s
  • Product
    • Platform Overview
      • RunSafe Identify
      • RunSafe Protect
      • RunSafe Monitor
      • Integrations
      • Product Updates
      • Platform Pricing
      • Standards & Compliance
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Open Source License Compliance
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
    • Automotive
    • Aerospace and Defense
    • Energy
    • Railway
  • Industries
    • Medical Devices
    • Industrial Automation
    • High-Tech Manufacturing
  • About
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
    • Events
    • Blog
    • Case Studies
    • Whitepapers
    • Reports
    • Videos
    • Podcasts
    • Webinars
    • FAQ
      • Use Cases
        • Embedded Systems Protection
        • OT/ICS Device Security
        • Military Embedded Systems
        • Advanced Driver Assistance Systems
        • Electronic Control Units
        • Connected Vehicle Security
        • Medical Device FDA Compliance
        • Secure Flight Control Systems
  • TALK TO AN EXPERT
  • Log In
Breaking Down the Top 15 Software Supply Chain Attacks

Breaking Down the Top 15 Software Supply Chain Attacks

by Nicole Spewak | Feb 4, 2026 | Software Supply Chain

Software supply chain attacks surged at the end of 2025, with 41 attacks uncovered in October alone. And there was an unmistakable pattern. Attackers stopped trying to breach organizations directly and instead focused on opportunities for widespread impact.  Why pick...
Safety Meets Security: Building Cyber-Resilient Systems for Aerospace and Defense

Safety Meets Security: Building Cyber-Resilient Systems for Aerospace and Defense

by Nicole Spewak | Nov 20, 2025 | Aerospace/Defense

In aerospace and defense, the line between safety and cybersecurity has disappeared. As aircraft and defense systems become increasingly software-defined and network-connected, the same architectures that deliver speed, agility, and capability also introduce new...
Memory Safety KEVs Are Increasing Across Industries

Memory Safety KEVs Are Increasing Across Industries

by Nicole Spewak | May 23, 2025 | Memory Safety, Uncategorized

Memory safety vulnerabilities are one of the most prevalent weaknesses in software, and the number of Known Exploited Vulnerabilities (KEVs) across industries are steadily increasing. In a webinar hosted by Dark Reading, RunSafe Security CTO Shane Fry and VulnCheck...
Understanding Memory Safety Vulnerabilities: Top Memory Corruption Bugs and How to Address Them

Understanding Memory Safety Vulnerabilities: Top Memory Corruption Bugs and How to Address Them

by Nicole Spewak | Feb 26, 2025 | Memory Safety, Uncategorized

Memory safety vulnerabilities remain one of the most persistent and exploitable software weaknesses. Memory corruption flaws, when exploited, allow attackers to execute arbitrary code, escalate privileges, bypass security controls, or crash or take over critical...
CISA’s 2026 Memory Safety Deadline: What OT Leaders Need to Know Now

CISA’s 2026 Memory Safety Deadline: What OT Leaders Need to Know Now

by Nicole Spewak | Nov 20, 2024 | Compliance & Regulations, Memory Safety, OT/ICS, Uncategorized

Recently, nation-state actors, like the Volt Typhoon campaign, have demonstrated the potential real-world impact of memory safety vulnerabilities in the software used to run critical infrastructure. It’s for this reason, among other national security, economic, and...
Guide to Creating and Utilizing SBOMs
RunSafe White and Orange Logo

 Headquarters: 1775 Tysons Blvd, Fifth Floor McLean, VA 22102
 Huntsville Regional Office: 850 Ben Graves Dr NW, Huntsville, AL 35816
EMEA Office: Agnes-Pockels-Bogen 1 80992 Munich, Germany
+1 (571) 441-5076
Sales@RunSafeSecurity.com

  • Platform
  • Partners
  • News
  • Blog
  • FAQ
  • Contact
  • Subscribe to Newsletter
  • Slack Community Channel
TALK TO AN EXPERT
ISO/IEC 27001 Certified

© Copyright 2026 RunSafe Security. All Rights Reserved.

Privacy Policy      Terms

  • Follow
  • Follow
  • Follow