Recently, nation-state actors, like the Volt Typhoon campaign, have demonstrated the potential real-world impact of memory safety vulnerabilities in the software used to run critical infrastructure. It’s for this reason, among other national security, economic, and...
Cybersecurity, or the lack thereof, now has the potential to impact geopolitical events. As widely reported and heard in testimony to Congress, Volt Typhoon — a group of state-sponsored cyber actors backed by the People’s Republic of China (PRC) — has penetrated...
Why Embedded Systems Matter for Automotive SecurityHow to Secure Automotive Embedded Systems and the Software Supply Chain1. Prioritize Software Bill of Materials (SBOMs) to Evaluate the Software Supply Chain2. Secure Embedded Systems from the Ground Up3. ...
Memory Safety: A Persistent ThreatWhat Is Secure by Design?RunSafe’s Contribution to Secure by DesignChallenges in Adopting Secure by DesignThe Benefits of Secure by DesignBuilding a Resilient Future The software industry faces a persistent challenge: how to...
Table of Contents: Introduction The Unique Challenges Facing DoD Systems RunSafe’s Approach to Cyber Resilience for DoD Systems Integrating RunSafe into DoD Systems The Future of Cyber Resilience for DoD How RunSafe Ensures Mission Success in the DoD’s...
Table of Contents: Introduction The Hidden Costs of Rewriting Code The Memory Safety Crisis: A Growing Concern Innovative Approaches to Memory Safety Addressing Memory Safety: A Comprehensive Approach The Real Cost of Rewriting Code for Memory Safety – Is There...