RunSafe Security
  • Product
    • Platform Overview
      • RunSafe Identify – SBOM generation, license compliance & vuln identification
      • RunSafe Protect – Automated runtime code protection
      • RunSafe Monitor – Runtime monitoring solution
    • Integrations & Supported Platforms
      • Product Updates
      • Standards & Compliance
      • Platform Pricing
      • Start Your Free Trial
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Open Source License Compliance
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
  • Industries
    • Automotive
    • Medical Device
    • Aerospace and Defense
    • Industrial Automation
    • High-Tech Manufacturing
    • Energy
    • Railway
  • About Us
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
    • Learn
      • Blog
      • Podcasts
      • Webinars
      • Videos
      • Events
      • FAQ
    • Explore Solutions
      • Case Studies
      • Whitepapers
      • Reports
      • Total Cost of Ownership Calculator
      • Download Resources
      • Product Updates
    • Use Cases
      • Embedded Device Security
      • Software Supply Chain Security
      • OT/ICS Device Security
      • Military Embedded Systems
      • Advanced Driver Assistance Systems
      • Electronic Control Units
      • Connected Vehicle Security
      • Medical Device FDA Compliance
      • Secure Flight Control Systems
  • TALK TO EXPERT
  • RUN RISK ANALYSIS
  • Log In
%1$s
  • Product
    • Platform Overview
      • RunSafe Identify
      • RunSafe Protect
      • RunSafe Monitor
      • Integrations
      • Product Updates
      • Platform Pricing
      • Standards & Compliance
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Open Source License Compliance
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
    • Automotive
    • Aerospace and Defense
    • Energy
    • Railway
  • Industries
    • Medical Devices
    • Industrial Automation
    • High-Tech Manufacturing
  • About
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
    • Events
    • Blog
    • Case Studies
    • Whitepapers
    • Reports
    • Videos
    • Podcasts
    • Webinars
    • FAQ
      • Use Cases
        • Embedded Systems Protection
        • OT/ICS Device Security
        • Military Embedded Systems
        • Advanced Driver Assistance Systems
        • Electronic Control Units
        • Connected Vehicle Security
        • Medical Device FDA Compliance
        • Secure Flight Control Systems
  • Consultation Request
  • RISK REDUCTION ANALYSIS
  • Log In
Take a Beat on AI, CISA Tells OT Operators

Take a Beat on AI, CISA Tells OT Operators

by Nicole Spewak | Dec 29, 2025

Joseph M. Saunders comments on the use of AI-generated code in embedded systems and how it relates to CISA’s new guidance for OT operators.
Cybersecurity in power: supply chain most vulnerable, varying confidence in resilience

Cybersecurity in power: supply chain most vulnerable, varying confidence in resilience

by Nicole Spewak | Dec 11, 2025

Joseph M. Saunders shares why the greatest risk for the power sector is vulnerabilities in the software supply chain and third-party components.
We’ve Got Worms: Update on Sandworm Infostealer

We’ve Got Worms: Update on Sandworm Infostealer

by Nicole Spewak | Dec 4, 2025

Joseph M. Saunders comments on the dangers of the Shai-Hulud Sandworm for software supply chain security and advice for how to address attacks in the future.
What Jaguar Land Rover’s Shutdown Reveals About the Next Supply Chain Crisis

What Jaguar Land Rover’s Shutdown Reveals About the Next Supply Chain Crisis

by Nicole Spewak | Nov 18, 2025

Joseph M. Saunders explains how Jaguar Land Rover’s cyberattack demonstrates the complexity of supply chains, and what could happen if attackers target automotive software next.
As industrial systems modernize, adaptive OT cybersecurity replaces patchwork defense

As industrial systems modernize, adaptive OT cybersecurity replaces patchwork defense

by Nicole Spewak | Oct 20, 2025

Joseph M. Saunders discusses why one of the biggest blindspots in industrial systems is vulnerabilities in the software supply chain. Read more in Industrial Cyber.
123...»23
Guide to Creating and Utilizing SBOMs
RunSafe White and Orange Logo

 Headquarters: 1775 Tysons Blvd, Fifth Floor McLean, VA 22102
 Huntsville Regional Office: UAH I2C Building 301 Sparkman Dr. Huntsville, AL 35899
EMEA Office: Agnes-Pockels-Bogen 1 80992 Munich, Germany
+1 (571) 441-5076
Sales@RunSafeSecurity.com

  • Platform
  • Partners
  • News
  • Blog
  • FAQ
  • Free Trial
  • Contact
  • Subscribe to Newsletter
  • Slack Community Channel
Secure Your Systems Now
ISO/IEC 27001 Certified

© Copyright 2025 RunSafe Security. All Rights Reserved.

Privacy Policy      Terms

  • Follow
  • Follow
  • Follow