RunSafe Security
  • Platform
    • Mastering SBOMs Guide
    • Platform
      • Overview
      • RunSafe Identify
      • RunSafe Protect
      • RunSafe Monitor
      • Product Updates
      • Start Your Free Trial
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Protect Proprietary Software
      • Secure Open Source Packages
      • Legacy Systems
      • Runtime Protection
      • Quantify Attack Surface Reduction
  • Solutions
    • Industries
      • Automotive
      • Defense and Aerospace
      • Energy
      • High-Tech Manufacturing
      • Industrial Automation
      • Medical Devices
      • Railway
    • Use Cases
      • Application Security Hardening
      • CI/CD Security
      • Cloud Workload Protection
      • DevSecOps
      • Embedded Devices
      • Mission-Critical Assets
      • OT/ICS Device Security
      • Software Supply Chain
      • Military Embedded Systems
      • Advanced Driver Assistance Systems
      • Electronic Control Units
      • Medical Device FDA Compliance
  • Teams
    • Product Leaders
    • Developers & Engineers
    • Industrial Asset Owners
    • Product Security Teams
  • About Us
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
    • Learn
      • Blog
      • Podcasts
      • Webinars
      • Videos
      • Events
      • FAQ
    • Explore Solutions
      • Case Studies
      • Whitepapers
      • Total Cost of Ownership Calculator
      • Download Resources
      • Product Updates
  • TALK TO EXPERT
  • RUN RISK ANALYSIS
  • Log In
%1$s
  • Platform
    • Platform
      • Overview
      • RunSafe Identify
      • RunSafe Protect
      • Product Updates
      • RunSafe Monitor
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Protect Proprietary Software
      • Secure Open Source Packages
      • Legacy Systems
      • Runtime Protection
      • Quantify Attack Surface Reduction
  • Solutions
    • Industries
      • Automotive
      • Defense and Aerospace
      • Energy
      • High-Tech Manufacturing
      • Industrial Automation
      • Medical Devices
      • Railway
      • Military Systems
    • Use Cases
      • Application Security Hardening
      • CI/CD Security
      • Cloud Workload Protection
      • DevSecOps
      • Embedded Systems Protection
      • Mission-Critical Assets
      • OT/ICS Device Security
      • Software Supply Chain
      • Electronic Control Units
      • Advanced Driver Assistance Systems
      • Medical Device FDA Compliance
  • Teams
    • Product Leaders
    • Developers & Engineers
    • Industrial Asset Owners
    • Product Security Teams
  • About
    • Our Story
    • Team
    • In the News
    • Press Releases
    • Recognition
    • Contact
  • Partners
  • Resources
    • Events
    • Blog
    • Case Studies
    • Whitepapers
    • Videos
    • Podcasts
    • Webinars
    • FAQ
  • Consultation Request
  • RISK REDUCTION ANALYSIS
  • Log In
Cyber security in the supply chain

Cyber security in the supply chain

by RunSafe Security | May 8, 2019 | Software Supply Chain, Uncategorized

Note: This article was originally written exclusively for Supply Chain Digital. Stop me if you have heard this before: as companies increasingly rely on third-party software applications, many are losing control over their software supply chain. As globalization...
The Cyber Risk to a Critical Part of Our Economy and Supply Chain:  Commercial Trucking

The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking

by RunSafe Security | Apr 11, 2019 | Software Supply Chain, Uncategorized

12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with government Electronic Logging Data...
Connectivity & Complex Supply Chains: Vulnerabilities of U.S. Weapon Systems

Connectivity & Complex Supply Chains: Vulnerabilities of U.S. Weapon Systems

by RunSafe Security | Nov 14, 2018 | Software Supply Chain, Uncategorized

Bucking the trend of a cybersecurity blog beginning with bad news, we’re beginning this post with some positive news:  the hunt for solutions to weapon systems vulnerabilities is finally underway. This thanks to The MITRE report (August), the GAO report (October), and...
Supply Chain Cyberattacks Surging – How Can We Prevent Them?

Supply Chain Cyberattacks Surging – How Can We Prevent Them?

by RunSafe Security | Apr 11, 2018 | Software Supply Chain, Uncategorized

Supply chain attacks Symantec’s new “Internet Security Threat Report,” shows a 200% increase in reported supply chain cyberattacks year on year.1 A supply chain attack seeks to damage an organization by targeting vulnerable elements in its global supply network. For...
1«...456
Guide to Creating and Utilizing SBOMs
RunSafe White and Orange Logo

 Headquarters: 1775 Tysons Blvd, Fifth Floor McLean, VA 22102
 Huntsville Regional Office: UAH I2C Building 301 Sparkman Dr. Huntsville, AL 35899
EMEA Office: Agnes-Pockels-Bogen 1 80992 Munich, Germany
+1 (571) 441-5076
Sales@RunSafeSecurity.com

  • Platform
  • Partners
  • News
  • Blog
  • FAQ
  • Free Trial
  • Contact
  • Subscribe to Newsletter
  • Slack Community Channel
Secure Your Systems Now
ISO/IEC 27001 Certified

© Copyright 2025 RunSafe Security. All Rights Reserved.

Privacy Policy      Terms

  • Follow
  • Follow