RunSafe Security
  • Product
    • Platform Overview
      • RunSafe Identify – SBOM generation, license compliance & vuln identification
      • RunSafe Protect – Automated runtime code protection
      • RunSafe Monitor – Runtime monitoring solution
    • Integrations & Supported Platforms
      • Product Updates
      • Standards & Compliance
      • Start Your Free Trial
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Source License Compliance
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
  • Industries
    • Automotive
    • Medical Device
    • Aerospace and Defense
    • Industrial Automation
    • High-Tech Manufacturing
    • Energy
    • Railway
  • About Us
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
    • Learn
      • Blog
      • Podcasts
      • Webinars
      • Videos
      • Events
      • FAQ
    • Explore Solutions
      • Case Studies
      • Whitepapers
      • Reports
      • Total Cost of Ownership Calculator
      • Download Resources
      • Product Updates
    • Use Cases
      • Embedded Device Security
      • Software Supply Chain Security
      • OT/ICS Device Security
      • Military Embedded Systems
      • Advanced Driver Assistance Systems
      • Electronic Control Units
      • Connected Vehicle Security
      • Medical Device FDA Compliance
      • Secure Flight Control Systems
  • TALK TO EXPERT
  • RUN RISK ANALYSIS
  • Log In
%1$s
  • Product
    • Platform Overview
      • RunSafe Identify
      • RunSafe Protect
      • RunSafe Monitor
      • Integrations
      • Product Updates
      • Standards & Compliance
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Open Source License Compliance for Embedded Software
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
    • Automotive
    • Aerospace and Defense
    • Energy
    • Railway
  • Industries
    • Medical Devices
    • Industrial Automation
    • High-Tech Manufacturing
  • About
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
    • Events
    • Blog
    • Case Studies
    • Whitepapers
    • Reports
    • Videos
    • Podcasts
    • Webinars
    • FAQ
      • Use Cases
        • Embedded Systems Protection
        • OT/ICS Device Security
        • Military Embedded Systems
        • Advanced Driver Assistance Systems
        • Electronic Control Units
        • Connected Vehicle Security
        • Medical Device FDA Compliance
        • Secure Flight Control Systems
  • Consultation Request
  • RISK REDUCTION ANALYSIS
  • Log In
VxWorks, DOD Weapons Systems and RunSafe

VxWorks, DOD Weapons Systems and RunSafe

by RunSafe Security | Aug 27, 2019 | Code Protection, Embedded Security, Uncategorized

DoD weapon systems remain vulnerable to cyber attack.  It’s not clear which ones will actually be able to perform when needed.  The VxWorks/URGENT 11 vulnerabilities offer another example. VxWorks is a real-time operating system (RTOS) used in embedded systems. It is...
You Now Know that VxWorks is Vulnerable. Now What?

You Now Know that VxWorks is Vulnerable. Now What?

by RunSafe Security | Aug 22, 2019 | Code Protection, Embedded Security, Uncategorized

Securing a large complex enterprise network is a challenging, never-ending process. The move to cloud has intensified the problem. Often, there is nothing to protect an IT system when a breach makes it past perimeter defenses. Moreover, memory corruption bugs are...
You Now Know that VxWorks is Vulnerable. Now What?

Embracing DevSecOps with Automated Software Binary Security

by RunSafe Security | May 16, 2019 | Code Protection, Embedded Security, Uncategorized

DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often part of an original build, but rather...
The Lottery You Don’t Want to Win: Introducing the RunSafe Pwn Index™

The Lottery You Don’t Want to Win: Introducing the RunSafe Pwn Index™

by RunSafe Security | Mar 6, 2019 | Embedded Security, Uncategorized

Financial instruments have given enterprises good tools and processes by which to manage their risk, but there is absolutely no limit to the amount of threat intelligence that security teams can benefit from having at their disposal. To help enterprise security teams...
Beating Vendor Fatigue: Considerations for Choosing the Right Cybersecurity Provider

Beating Vendor Fatigue: Considerations for Choosing the Right Cybersecurity Provider

by RunSafe Security | Feb 12, 2019 | Embedded Security, Uncategorized

Organizations often perceive cybersecurity as a necessary evil. They know that it’s critical to protect business assets but it’s seldom seen as a driver that helps move the business forward. It’s a checkbox, a requirement that is begrudgingly addressed to reduce risk...
1«...345
Guide to Creating and Utilizing SBOMs
RunSafe White and Orange Logo

 Headquarters: 1775 Tysons Blvd, Fifth Floor McLean, VA 22102
 Huntsville Regional Office: UAH I2C Building 301 Sparkman Dr. Huntsville, AL 35899
EMEA Office: Agnes-Pockels-Bogen 1 80992 Munich, Germany
+1 (571) 441-5076
Sales@RunSafeSecurity.com

  • Platform
  • Partners
  • News
  • Blog
  • FAQ
  • Free Trial
  • Contact
  • Subscribe to Newsletter
  • Slack Community Channel
Secure Your Systems Now
ISO/IEC 27001 Certified

© Copyright 2025 RunSafe Security. All Rights Reserved.

Privacy Policy      Terms

  • Follow
  • Follow
  • Follow