Blog

OpenSSL Vulnerability Protection

OpenSSL Vulnerabilities: What Do They Mean to You?

Table of Contents: OpenSSL Vulnerabilities: What Do They Mean to You? What is Remote Code Execution? OpenSSL: Vulnerabilities Still Exist The Broader Question: Improving Security Posture Reduce Your Attack Surface   On November 1, 2022, OpenSSL Security Team published a blog regarding its security advisory for two vulnerabilities, CVE-2022-3786 (“X.509 Email Address Variable Length Buffer…

Read More
5G Impact on National Security

How Does 5G Impact National Security?

Table of Contents: How Does 5G Impact National Security? Securing the 5G Global Network DoD’s Response to 5G Security Will There Be a National 5G Network? Protecting 5G Networks Watch the 5G Bash at CyberWeek 2020   RunSafe Security hosted a 5G Cyber Bash webinar as a part of CyberWeek 2020. Our thought leadership two…

Read More
Cyber Decision Makers Survey

New Survey Results: Cyber Decision Makers Are Unaware about the State of Firmware Security

Table of Contents: New Survey Results: Cyber Decision Makers Are Unaware about the State of Firmware Security Are Cyber Risk Decision Makers Truly Informed? What Tools Are Available to Fill Cyber Knowledge Gaps?   The software world continues to undergo dramatic change. From digital transformation to devops and shift left, organizations are re-inventing their software…

Read More
Importance of Improving Code Security

Preventing Cyber Attacks is Impossible but Improving Code Security Isn’t

Table of Contents: Preventing Cyber Attacks is Impossible but Improving Code Security Isn’t The Importance of Software Supply Chain Security How to Improve Code Security Future Goals for Cybersecurity Experts   In a recent episode of “In the Nic of Time”, Nicolas Chaillan interviewed David Wheeler, an expert on open source software. David is the…

Read More
Schneider Electric Chooses RunSafe

Schneider Electric Chooses RunSafe to Protect HMI Products

Table of Contents: Schneider Electric Chooses RunSafe to Protect HMI Products What is HMI and Why Is It Important to Industrial Security? How to Protect HMI Products Protect Your Software Against Vulnerabilities   Over the past several years, Hackers Arise has noted that attackers target ICS/SCADA systems in two primary areas:  Attack the protocols (modbus,…

Read More

Open Source Software from an Attacker’s Point of View

Table of Contents: Open Source Software from an Attacker’s Point of View Bad Actors Will Find Vulnerabilities to Exploit How Are Bad Actors Getting In? Protect Yourself From Bad Actors with an Open Source Software Protection System   Open source software is being used at companies worldwide. From the smallest businesses to multinational Fortune 500…

Read More
ICS Advisory

ICS Advisory Recap: How to Mitigate Today’s Most Prevalent Cyber Risks

Table of Contents: ICS Advisory Recap: How to Mitigate Today’s Most Prevalent Cyber Risks Recent ICS-CERT Advisories How RunSafe Protects Against These Attacks Prioritize Cybersecurity and Reduce Attack Surface with RunSafe   At RunSafe Security, we appreciate the tremendous work Cybersecurity and Infrastructure Security Agency (CISA) performs to help our nation be more resilient.  In…

Read More

The Attack Surface is Increasing: Understand Your Risk & Protect Your Software

Table of Contents: The Attack Surface is Increasing: Understand Your Risk & Protect Your Software Taking Inspiration From Loyalty Marketing Programs Eliminate Software Vulnerabilities   With cyber attacks on the rise, it is more important than ever that your software is protected against threat actors, data loss, data theft, and more. Beyond phishing attacks, cyber…

Read More
How to Avoid Ransomware

Protecting Yourself From Ransomware Attacks

Table of Contents: Protecting Yourself From Ransomware Attacks Cyber Attacks Cost $6 Trillion to Fix in 2021 Software Supply Chain Attacks Are on the Rise The Rising Cost of Ransomware Zero-Day Memory Exploits Have a Banner Year RunSafe Security’s Alkemist is the Best Ransomware Prevention   In an increasingly online and interconnected world, it’s not…

Read More
How to keep your software secure from Hackers

Changing the Economics of Open Source Software

Table of Contents:   Changing the Economics in Open Source Software What the “Old Ways” Are Lacking Building Intrinsic Security into Code Itself Making Code Self-Protecting Dramatically Reducing Exploitable Vulnerabilities Maintaining High-Velocity Code Release Schedules   What the “Old Ways” Are Lacking Open source software, in its three decades of existence, has experienced rapid growth…

Read More
Take Action to Protect Software Infrastructure

Common Misconceptions Putting Organizations at Risk

Table of Contents: Common Misconceptions Putting Organizations at Risk 1. Our Company is an Unlikely Target 2. Cybersecurity is Expensive. 3. We Don’t Need to Worry Because We Have Security Tools to Alert Us Immediately Take Action to Protect Software Infrastructure   Cybersecurity remains an imperative issue as cyber attacks continue to soar. The number…

Read More
Cybersecurity trends

Cybersecurity Trends to Prepare for in 2022

Table of Contents: Recap of Cybersecurity and Cyber Attacks in 2021 Security Monitoring  Embedded Device Security Open Source Software Security Cloud Workload Security Recap of Cybersecurity and Cyber Attacks in 2021 Dare I say that the past year has been…drumroll…unprecedented…in the realm of cybersecurity and cyber attacks?  Here are some statistics to showcase what the…

Read More
Understanding ransomware threats

The Ransomware Threat: Reflections from the Billington Cybersecurity Summit

The Ransomware Threat   RunSafe Security founder and CEO Joe Saunders recently sat down with an expert panel for the Billington Cybersecurity Summit. The event featured three days of high-level networking and knowledge-sharing to advocate the cyber mission in the U.S. government and among allied countries.  The panelists included the following government and private sector leaders:…

Read More
How to keep software safe with linux changes

Prioritizing Software Security in the Changing Linux Landscape

In a recent webinar hosted by RunSafe Security, moderator Nick Rea, Customer Engineering Leader at Google Cloud, guides a discussion on changing Linux distributions. Learn how containers and cloud services impact security from panelists with expertise in linux, software security, and technology research: Greg Kurtzer, CEO of Ctrl IQ, original CentOS author, and founder and…

Read More
security monitoring & vulnerability management to prevent cyberthreats panel

How to Address Threats with Security Monitoring

It’s clear from the recent attacks on big business that cybercriminals are escalating their attacks and exposing our weaknesses. From malware to ransomware, malicious actors are finding their way through our defenses.

Read More
Immunize your embedded devices’ software with built-in security protections against jackware.

An Embedded Devices “Doomsday” is Upon Us: How to Prevent Jackware

It’s no secret that despite our best efforts to eliminate exploits in today’s enterprise applications and software, they’re still finding a way in. In order to begin fighting these exploits and immunizing your software, the first place to start is identifying their avenues of attack.

Read More