RunSafe Security, the pioneer of a patented process to immunize software from cyber attacks without developer friction and a member of Oracle PartnerNetwork (OPN), today announced the launch of their Enterprise Software Protection (ESP) program on the Oracle Cloud Marketplace, the premier platform for one-click deployment of top tier partner-built applications.
In The News
BYOD on steroids. That’s the best way to describe the sudden shift to a remote working posture that occurred in response to COVID-19. Organizations of all sizes made an immediate pivot to support employees’ new work from home arrangements, with very little preparation and no opportunity for a gradual rollout. Before coronavirus, working from home was the exception, but in an instant, it became the norm and the working world immediately felt the impact.
Teleconferencing companies like Zoom went from a high-tech favored product to a mainstream tool for students, families, governments, and companies of all sizes. Wall Street traders at Goldman Sachs and other firms prepared for remote trading by quickly setting up special video conferencing setups to run all day. And it wasn’t just the private sector — even the UK Prime Minister and the Pentagon turned to Zoom to make remote work possible during a time of global crisis. With a high profile and perhaps a bullseye on its back, Zoom’s security practices quickly came under the spotlight.
Initially developed by Richard Stallman in 1983 and popularized by Linus Torvalds in the early 1990s, open source software has evolved tremendously over the last 37 years. Although it started out as a niche practice, it became more mainstream in the 2000s. Its value was initially verified by Sun Microsystems’ $1 billion acquisition of MySQL in 2008, and more recently by IBM’s purchase of Red Hat for $34 billion last year. Now the most popular open source software, GNU/Linux runs on nearly 70% of web servers and is maintained by more than 15,000 unique programmers around the world. However, there remains an ongoing debate within the tech industry on both the pros and cons of open source software. We’ve taken a look at a couple of each and discussed below.
A ransomware attack shut down a natural gas compressor station for two days causing a “loss of productivity and revenue,” according to an alert last week from the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The disruption represents a growing threat to the domestic energy sector, with more sophisticated attacks beginning to target the industrial control systems (ICS) which help to run electric grids and pipeline systems. The compressor station attack began on the information technology (IT) side of a pipeline company’s operations, but spread to the operations technology (OT) side because of a lack of system segmentation, experts say.
“Most utilities don’t have IP enabled smart grid at any scale and SCADA is a little harder to attack,” RunSafe CEO Joe Saunders said. “But as they shift, they need protection in this area. Older operating and information systems need to be protected or upgraded.”
Industry’s favorite skeptics are meeting in San Francisco this week for the RSA Conference. The drama is palpable. Last week the Dell Technologies sold the conference’s parent company RSA Security to a consortium for just over $2 billion. So, what keeps security leaders up at night? CIO Dive asked RSA Conference attendees, including RunSafe Securit CEO Joe Saunders what they are most eager to see and what they want their peers to learn.
Tysons cybersecurity firm RunSafe Security Inc. has closed an initial $6.3 million funding round as it seeks to build out its customer base and expand its sales efforts, CEO Joe Saunders said in an interview. That first close leaves room for an additional strategic investor to join the round, Saunders said. The company has already gotten backing from a number of notable firms, including San Francisco-based Alsop Louie Partners, local venture capitalist Justin Label’s Inner Loop Capital, the Center for Innovative Technology’s GAP Funds and Renegade Ventures.
The vicious cycle of imbalance between cyber attackers and defenders seems never-ending. Defenders continue to develop and implement new tools to prevent, detect, monitor and remediate cyber threats while attackers simultaneously develop new attack techniques to thwart defenses, which for all intents and purposes gives them the upper hand.
“Cyberhardening IoT systems to reduce vulnerabilities can protect risky systems already in the field.” This is just one of many reasons why Network World recently named RunSafe Security as one of 10 Hot IoT Startups to watch this year.
Defense contractors have a clear opportunity today to impel the DoD to increase the cyber resilience of weapon systems by making incremental, measurable, bottoms-up cultural changes. Dave Salwen, VP of Federal, explains more in his recent article for Defense Systems magazine.
CEO Joe Saunders spoke with CSO Magazine on the emerging cybersecurity threat known as AI Fuzzing. The article details why this may be the next big threat facing the security industry – and why nation-states and sophisticated cybercriminals are likely using it.
At RSA, Cyberscoop spoke with CEO Joe Saunders on the Securiosity podcast about the the RunSafe Pwn Index™, a proprietary score and methodology to help enterprise security teams reduce risk by tracking the average price of cyber exploits targeting enterprise and government agency software assets.
In order to give enterprises a better look at what attackers are paying for, CyberScoop has teamed up with RunSafe Security to bring you the RunSafe Pwn Index. Think of it as the Dow Jones Industrial Average for dark web exploits.
As companies increasingly rely on third-party software applications, many are losing control over their software supply chain. As globalization continues to scale and geographic constraints loosen, a strong supply chain is all but necessary to compete in the worldwide marketplace.
Solution providers will have to contend with a multitude of security-related challenges in 2019 ranging from nation-state and supply chain attacks to increased activity around biometrics and cryptomining. Here’s how we think they’ll do it.
Off-highway vehicles are now loaded with an ever-growing array of software-driven, interconnected, semi-autonomous devices, such as smart sensors, variable speed fan drives and monitors. Telematic is more prevalent and supply chains are becoming increasingly complex.
Here’s a nightmare scenario: hackers gain access to a healthcare service network, affecting 40 hospitals and health facilities, locking staff out of their computers, denying access to patient medical records, appointment schedules, and email.
Like all sectors of critical infrastructure, the oil and gas industry has emerged as a top target for cyberattack, yet most companies are not doing nearly enough to mitigate the risks. Demand for business insight and device monitoring has led many oil and gas companies to merge OT (Operational Technology), such as their control systems, with enterprise IT systems.
Cloud computing is now a primary driver of the world’s digital economy. Governments, large corporations and small businesses are increasingly implementing cloud-based infrastructures and solutions to store their sensitive data and manage their operations.
An average hospital room can house as many as 20 medical devices, and almost all of them will be networked – either wired or wirelessly.
With the many reported attacks on utilities, SCADA systems, and operational technology, I’d have to say that the level of cybersecurity awareness – especially within IIoT and ICS – is increasing.
Have you heard the one about the fish tank in the casino? A smart device in the lobby aquarium of a North American casino had been remotely monitoring temperature, salinity, and automatic feedings.
RunSafe’s Alkemist prevents scaling attacks, fileless attacks, and compromised supply chain attacks. Since it cuts down whole attack surfaces, it is well positioned to stop zero-days that depend on them.
The problem with traditional cybersecurity solutions is that they focus more on detecting symptoms rather than on addressing the underlying causes.
RunSafe Security released Alkemist, a proprietary self-service technology built to reduce vulnerabilities and deny malware the uniformity needed to execute.
RunSafe Security announced the availability of Alkemist, a proprietary self-service technology built to reduce vulnerabilities and deny malware the uniformity needed to execute.
“We eliminate an entire class of attacks and greatly reduce the attack surface for software across critical infrastructure,” RunSafe told TechCrunch.
The Internet of Things (IoT), Industrial Internet of Things (IIoT), and cloud-based applications have rapidly expanded data center risk, as smart devices increase attack vectors exponentially.
Curiosity often starts with a question. Cybersecurity is filled with them. What’s that? Will that work? How much will that cost? These questions aren’t easily answered, yet they are still worth asking.
The importance of cyber defense prevention cannot be underestimated in today’s increasingly perilous environment. RunSafe CEO Joe Saunders explains in this month’s edition of Cyber Defense Magazine.