Recently, nation-state actors, like the Volt Typhoon campaign, have demonstrated the potential real-world impact of memory safety vulnerabilities in the software used to run critical infrastructure. It’s for this reason, among other national security, economic, and...
Cybersecurity is now a strategic factor in global conflict and geopolitical events. As widely reported and heard in testimony to Congress, Volt Typhoon — a group of state-sponsored cyber actors backed by the People’s Republic of China (PRC) — has penetrated...
Why Embedded Systems Matter for Automotive Security How to Secure Automotive Embedded Systems and the Software Supply Chain 1. Prioritize Software Bill of Materials (SBOMs) to Evaluate the Software Supply Chain 2. Secure Embedded Systems from the Ground Up 3. ...
Memory Safety: A Persistent Threat What Is Secure by Design? RunSafe’s Contribution to Secure by Design Challenges in Adopting Secure by Design The Benefits of Secure by Design Building a Resilient Future The software industry faces a persistent challenge: how...
Table of Contents: Introduction The Unique Challenges Facing DoD Systems RunSafe’s Approach to Cyber Resilience for DoD Systems Integrating RunSafe into DoD Systems The Future of Cyber Resilience for DoD How RunSafe Ensures Mission Success in the DoD’s...
Table of Contents: Introduction The Hidden Costs of Rewriting Code The Memory Safety Crisis: A Growing Concern Innovative Approaches to Memory Safety Addressing Memory Safety: A Comprehensive Approach The Real Cost of Rewriting Code for Memory Safety – Is There...