RunSafe Security
  • Product
    • Platform Overview
      • RunSafe Identify – SBOM generation, license compliance & vuln identification
      • RunSafe Protect – Automated runtime code protection
      • RunSafe Monitor – Runtime monitoring solution
    • Integrations & Supported Platforms
      • Product Updates
      • Standards & Compliance
      • Platform Pricing
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Open Source License Compliance
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
  • Industries
    • Automotive
    • Medical Device
    • Aerospace and Defense
    • Industrial Automation
    • High-Tech Manufacturing
    • Energy
    • Railway
  • About Us
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
      • Learn
        • Blog
        • Podcasts
        • Webinars
        • Videos
        • Events
        • FAQ
      • Explore Solutions
        • Case Studies
        • Whitepapers
        • Reports
        • Total Cost of Ownership Calculator
        • Download Resources
        • Product Updates
      • Use Cases
        • Embedded Device Security
        • Software Supply Chain Security
        • OT/ICS Device Security
        • Military Embedded Systems
        • Advanced Driver Assistance Systems
        • Electronic Control Units
        • Connected Vehicle Security
        • Medical Device FDA Compliance
        • Secure Flight Control Systems
  • TALK TO EXPERT
  • Log In
%1$s
  • Product
    • Platform Overview
      • RunSafe Identify
      • RunSafe Protect
      • RunSafe Monitor
      • Integrations
      • Product Updates
      • Platform Pricing
      • Standards & Compliance
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Open Source License Compliance
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
    • Automotive
    • Aerospace and Defense
    • Energy
    • Railway
  • Industries
    • Medical Devices
    • Industrial Automation
    • High-Tech Manufacturing
  • About
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
    • Events
    • Blog
    • Case Studies
    • Whitepapers
    • Reports
    • Videos
    • Podcasts
    • Webinars
    • FAQ
      • Use Cases
        • Embedded Systems Protection
        • OT/ICS Device Security
        • Military Embedded Systems
        • Advanced Driver Assistance Systems
        • Electronic Control Units
        • Connected Vehicle Security
        • Medical Device FDA Compliance
        • Secure Flight Control Systems
  • TALK TO AN EXPERT
  • Log In
The BIS Connected Vehicle Rule, Automakers, and Software Provenance

The BIS Connected Vehicle Rule, Automakers, and Software Provenance

by Joseph M. Saunders | Jan 30, 2026 | Automotive, Compliance & Regulations

Key Takeaways: The U.S. Connected Vehicle Rule focuses on software origin and provenance Open-source software is largely exempt, while commercial and proprietary components are in scope SCA tools lack the visibility needed for Connected Vehicle compliance Software...
AI Is Writing the Next Wave of Software Vulnerabilities — Are We “Vibe Coding” Our Way to a Cyber Crisis?

AI Is Writing the Next Wave of Software Vulnerabilities — Are We “Vibe Coding” Our Way to a Cyber Crisis?

by Joseph M. Saunders | Oct 15, 2025 | Code Protection, Memory Safety, Vulnerability Management

Artificial intelligence (AI) is reshaping how software is written and how vulnerabilities emerge. Developers are no longer limited to reusing open-source components or third-party libraries and instead are asking AI to build code on demand. This “vibe coding”...
Is Your Security Helping or Hurting Your Product Line Profitability?

Is Your Security Helping or Hurting Your Product Line Profitability?

by Joseph M. Saunders | Aug 18, 2025 | Embedded Security, Software Supply Chain, Vulnerability Management

Ask any product manager about their biggest budget headaches, and security will likely make the top three. It’s easy to see why. Security investments feel like insurance premiums, necessary but painful expenses that drain resources from feature development and...
Securing the ICS/OT Software Supply Chain: What Schneider Electric’s Discovery Means for Industrial Systems

Securing the ICS/OT Software Supply Chain: What Schneider Electric’s Discovery Means for Industrial Systems

by Joseph M. Saunders | Apr 28, 2025 | OT/ICS, Software Supply Chain, Uncategorized

Industrial systems worldwide share a common weakness in their software supply chains that most security strategies completely miss. Just ask Andy Kling, VP of Cybersecurity at Schneider Electric, one of the world’s leading industrial automation and energy companies....
Securing Space as the Next Frontier of Critical Infrastructure

Securing Space as the Next Frontier of Critical Infrastructure

by Joseph M. Saunders | Jan 8, 2025 | Code Protection, Embedded Security, Uncategorized

As space becomes a key sector in critical infrastructure, protecting it against cyber threats is essential to sustaining global stability and economic growth. Space systems support vital industries—transportation, communications, and energy—and their role in national...
12»
Guide to Creating and Utilizing SBOMs
RunSafe White and Orange Logo

 Headquarters: 1775 Tysons Blvd, Fifth Floor McLean, VA 22102
 Huntsville Regional Office: 850 Ben Graves Dr NW, Huntsville, AL 35816
EMEA Office: Agnes-Pockels-Bogen 1 80992 Munich, Germany
+1 (571) 441-5076
Sales@RunSafeSecurity.com

  • Platform
  • Partners
  • News
  • Blog
  • FAQ
  • Contact
  • Subscribe to Newsletter
  • Slack Community Channel
TALK TO AN EXPERT
ISO/IEC 27001 Certified

© Copyright 2026 RunSafe Security. All Rights Reserved.

Privacy Policy      Terms

  • Follow
  • Follow
  • Follow