Cybersecurity is now a strategic factor in global conflict and geopolitical events. As widely reported and heard in testimony to Congress, Volt Typhoon — a group of state-sponsored cyber actors backed by the People’s Republic of China (PRC) — has penetrated...
Memory Safety: A Persistent Threat What Is Secure by Design? RunSafe’s Contribution to Secure by Design Challenges in Adopting Secure by Design The Benefits of Secure by Design Building a Resilient Future The software industry faces a persistent challenge: how...
Table of Contents: Introduction The Hidden Costs of Rewriting Code The Memory Safety Crisis: A Growing Concern Innovative Approaches to Memory Safety Addressing Memory Safety: A Comprehensive Approach The Real Cost of Rewriting Code for Memory Safety – Is There...
Table of Contents: Introduction to Memory Safety Risks of Memory Vulnerabilities in Embedded Software Challenges of Addressing Memory Safety RunSafe’s Innovative Approach to Memory Safety Software Supply Chain Security with RunSafe Ensuring Security in Embedded...
Table of Contents: Memory Safety Through Hardening System Code From Static to Moving Risk Assessment Hardening the Code Protecting vulnerable systems A static target is a sitting duck. However, we all know that hitting a moving target can be far more challenging—as it...
Table of Contents: Safeguarding LYNX MOSA.ic: Lynx and RunSafe’s Security Partnership Why does memory safety matter to Lynx users? No impact on Runtime performance? Development schedule? Easier compliance with security requirements What about the Software Bill...