Memory safety vulnerabilities are one of the most prevalent weaknesses in software, and the number of Known Exploited Vulnerabilities (KEVs) across industries are steadily increasing. In a webinar hosted by Dark Reading, RunSafe Security CTO Shane Fry and VulnCheck...
The EU Cyber Resilience Act (CRA) is set to transform the landscape of cybersecurity compliance for manufacturers, developers, and supply chain providers across Europe—and its impact will be felt far beyond the EU’s borders. While the EU CRA won’t be fully enforced...
Operational technology (OT) ransomware attacks have escalated to crisis levels in 2025. A recent FBI report revealed a 9% increase in ransomware attacks targeting U.S. infrastructure in 2024, with more than 1,300 complaints linked to critical sectors like energy,...
Table of Contents: Changing the Economics in Open Source Software What the “Old Ways” Are Lacking Building Intrinsic Security into Code Itself Making Code Self-Protecting Dramatically Reducing Exploitable Vulnerabilities Maintaining High-Velocity Code Release...
Table of Contents: Common Misconceptions Putting Organizations at Risk 1. Our Company is an Unlikely Target 2. Cybersecurity is Expensive. 3. We Don’t Need to Worry Because We Have Security Tools to Alert Us Immediately Take Action to Protect Software Infrastructure...
Table of Contents: Recap of Cybersecurity and Cyber Attacks in 2021 Security Monitoring Embedded Device Security Open Source Software Security Cloud Workload Security Recap of Cybersecurity and Cyber Attacks in 2021 Dare I say that the past year has...