RunSafe Security
  • Platform
    • Mastering SBOMs Guide
    • Platform
      • Overview
      • RunSafe Identify
      • RunSafe Protect
      • RunSafe Monitor
      • Integrations
      • Product Updates
      • Start Your Free Trial
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Protect Proprietary Software
      • Secure Open Source Packages
      • Legacy Systems
      • Runtime Protection
      • Quantify Attack Surface Reduction
  • Solutions
    • Industries
      • Automotive
      • Defense and Aerospace
      • Energy
      • High-Tech Manufacturing
      • Industrial Automation
      • Medical Devices
      • Railway
    • Use Cases
      • Application Security Hardening
      • CI/CD Security
      • Cloud Workload Protection
      • DevSecOps
      • Embedded Devices
      • Mission-Critical Assets
      • OT/ICS Device Security
      • Software Supply Chain
      • Military Embedded Systems
      • Advanced Driver Assistance Systems
      • Electronic Control Units
      • Medical Device FDA Compliance
      • Connected Vehicle Security
  • Teams
    • Product Leaders
    • Developers & Engineers
    • Industrial Asset Owners
    • Product Security Teams
  • About Us
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
    • Learn
      • Blog
      • Podcasts
      • Webinars
      • Videos
      • Events
      • FAQ
    • Explore Solutions
      • Case Studies
      • Whitepapers
      • Reports
      • Total Cost of Ownership Calculator
      • Download Resources
      • Product Updates
  • TALK TO EXPERT
  • RUN RISK ANALYSIS
  • Log In
%1$s
  • Platform
    • Platform
      • Overview
      • RunSafe Identify
      • RunSafe Protect
      • Integrations
      • Product Updates
      • RunSafe Monitor
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Protect Proprietary Software
      • Secure Open Source Packages
      • Legacy Systems
      • Runtime Protection
      • Quantify Attack Surface Reduction
  • Solutions
    • Industries
      • Automotive
      • Defense and Aerospace
      • Energy
      • High-Tech Manufacturing
      • Industrial Automation
      • Medical Devices
      • Railway
      • Military Systems
    • Use Cases
      • Application Security Hardening
      • CI/CD Security
      • Cloud Workload Protection
      • DevSecOps
      • Embedded Systems Protection
      • Mission-Critical Assets
      • OT/ICS Device Security
      • Software Supply Chain
      • Electronic Control Units
      • Advanced Driver Assistance Systems
      • Medical Device FDA Compliance
      • Connected Vehicle Security
  • Teams
    • Product Leaders
    • Developers & Engineers
    • Industrial Asset Owners
    • Product Security Teams
  • About
    • Our Story
    • Team
    • In the News
    • Press Releases
    • Recognition
    • Contact
  • Partners
  • Resources
    • Events
    • Blog
    • Case Studies
    • Whitepapers
    • Reports
    • Videos
    • Podcasts
    • Webinars
    • FAQ
  • Consultation Request
  • RISK REDUCTION ANALYSIS
  • Log In
CISA’s 2026 Memory Safety Deadline: What OT Leaders Need to Know Now

CISA’s 2026 Memory Safety Deadline: What OT Leaders Need to Know Now

by Nicole Spewak | Nov 20, 2024 | Memory Safety, OT/ICS, Uncategorized

Recently, nation-state actors, like the Volt Typhoon campaign, have demonstrated the potential real-world impact of memory safety vulnerabilities in the software used to run critical infrastructure. It’s for this reason, among other national security, economic, and...
Don’t Let Volt Typhoon Win: Preventing Attacks During a Future Conflict

Don’t Let Volt Typhoon Win: Preventing Attacks During a Future Conflict

by Dave Salwen | Nov 14, 2024 | Code Protection, Memory Safety, Uncategorized

Cybersecurity is now a strategic factor in global conflict and geopolitical events.  As widely reported and heard in testimony to Congress, Volt Typhoon — a group of state-sponsored cyber actors backed by the People’s Republic of China (PRC) — has penetrated...
Buckle Up: Addressing Embedded Systems Security in the Automotive Software Supply Chain

Buckle Up: Addressing Embedded Systems Security in the Automotive Software Supply Chain

by RunSafe Security | Oct 15, 2024 | Automotive, Embedded Security, Uncategorized

  Why Embedded Systems Matter for Automotive Security How to Secure Automotive Embedded Systems and the Software Supply Chain 1. Prioritize Software Bill of Materials (SBOMs) to Evaluate the Software Supply Chain 2. Secure Embedded Systems from the Ground Up 3. ...
Secure by Design: Building a Safer Future Through Memory Safety

Secure by Design: Building a Safer Future Through Memory Safety

by RunSafe Security | Sep 14, 2024 | Memory Safety, Secure By Design, Uncategorized

  Memory Safety: A Persistent Threat What Is Secure by Design? RunSafe’s Contribution to Secure by Design Challenges in Adopting Secure by Design The Benefits of Secure by Design Building a Resilient Future The software industry faces a persistent challenge: how...
How RunSafe Ensures Mission Success in the DoD’s Cyber Landscape

How RunSafe Ensures Mission Success in the DoD’s Cyber Landscape

by RunSafe Security | Aug 30, 2024 | Code Protection, Embedded Security, Uncategorized

Table of Contents: Introduction The Unique Challenges Facing DoD Systems RunSafe’s Approach to Cyber Resilience for DoD Systems Integrating RunSafe into DoD Systems The Future of Cyber Resilience for DoD How RunSafe Ensures Mission Success in the DoD’s...
The Real Cost of Rewriting Code for Memory Safety – Is There a Better Way?

The Real Cost of Rewriting Code for Memory Safety – Is There a Better Way?

by RunSafe Security | Aug 27, 2024 | Code Protection, Memory Safety, Uncategorized

Table of Contents: Introduction The Hidden Costs of Rewriting Code The Memory Safety Crisis: A Growing Concern Innovative Approaches to Memory Safety Addressing Memory Safety: A Comprehensive Approach The Real Cost of Rewriting Code for Memory Safety – Is There...
1«...456...»15
Guide to Creating and Utilizing SBOMs
RunSafe White and Orange Logo

 Headquarters: 1775 Tysons Blvd, Fifth Floor McLean, VA 22102
 Huntsville Regional Office: UAH I2C Building 301 Sparkman Dr. Huntsville, AL 35899
EMEA Office: Agnes-Pockels-Bogen 1 80992 Munich, Germany
+1 (571) 441-5076
Sales@RunSafeSecurity.com

  • Platform
  • Partners
  • News
  • Blog
  • FAQ
  • Free Trial
  • Contact
  • Subscribe to Newsletter
  • Slack Community Channel
Secure Your Systems Now
ISO/IEC 27001 Certified

© Copyright 2025 RunSafe Security. All Rights Reserved.

Privacy Policy      Terms

  • Follow
  • Follow
  • Follow