RunSafe Security
  • Product
    • Platform Overview
      • RunSafe Identify – SBOM generation, license compliance & vuln identification
      • RunSafe Protect – Automated runtime code protection
      • RunSafe Monitor – Runtime monitoring solution
    • Integrations & Supported Platforms
      • Product Updates
      • Standards & Compliance
      • Platform Pricing
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Open Source License Compliance
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
  • Industries
    • Automotive
    • Medical Device
    • Aerospace and Defense
    • Industrial Automation
    • High-Tech Manufacturing
    • Energy
    • Railway
  • About Us
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
      • Learn
        • Blog
        • Podcasts
        • Webinars
        • Videos
        • Events
        • FAQ
      • Explore Solutions
        • Case Studies
        • Whitepapers
        • Reports
        • Total Cost of Ownership Calculator
        • Download Resources
        • Product Updates
      • Use Cases
        • Embedded Device Security
        • Software Supply Chain Security
        • OT/ICS Device Security
        • Military Embedded Systems
        • Advanced Driver Assistance Systems
        • Electronic Control Units
        • Connected Vehicle Security
        • Medical Device FDA Compliance
        • Secure Flight Control Systems
  • TALK TO EXPERT
  • Log In
%1$s
  • Product
    • Platform Overview
      • RunSafe Identify
      • RunSafe Protect
      • RunSafe Monitor
      • Integrations
      • Product Updates
      • Platform Pricing
      • Standards & Compliance
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Open Source License Compliance
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
    • Automotive
    • Aerospace and Defense
    • Energy
    • Railway
  • Industries
    • Medical Devices
    • Industrial Automation
    • High-Tech Manufacturing
  • About
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
    • Events
    • Blog
    • Case Studies
    • Whitepapers
    • Reports
    • Videos
    • Podcasts
    • Webinars
    • FAQ
      • Use Cases
        • Embedded Systems Protection
        • OT/ICS Device Security
        • Military Embedded Systems
        • Advanced Driver Assistance Systems
        • Electronic Control Units
        • Connected Vehicle Security
        • Medical Device FDA Compliance
        • Secure Flight Control Systems
  • TALK TO AN EXPERT
  • Log In
We’ve Got Worms: Update on Sandworm Infostealer

We’ve Got Worms: Update on Sandworm Infostealer

by Nicole Spewak | Dec 4, 2025

Joseph M. Saunders comments on the dangers of the Shai-Hulud Sandworm for software supply chain security and advice for how to address attacks in the future.
What Jaguar Land Rover’s Shutdown Reveals About the Next Supply Chain Crisis

What Jaguar Land Rover’s Shutdown Reveals About the Next Supply Chain Crisis

by Nicole Spewak | Nov 18, 2025

Joseph M. Saunders explains how Jaguar Land Rover’s cyberattack demonstrates the complexity of supply chains, and what could happen if attackers target automotive software next.
As industrial systems modernize, adaptive OT cybersecurity replaces patchwork defense

As industrial systems modernize, adaptive OT cybersecurity replaces patchwork defense

by Nicole Spewak | Oct 20, 2025

Joseph M. Saunders discusses why one of the biggest blindspots in industrial systems is vulnerabilities in the software supply chain. Read more in Industrial Cyber.
Hidden Surveillance Threats to U.S. Critical Infrastructure

Hidden Surveillance Threats to U.S. Critical Infrastructure

by Nicole Spewak | Oct 16, 2025

Joseph M. Saunders discusses how industrial espionage evolved from IP theft to surveillance and infrastructure sabotage in Manufacturing Business Technology.
Cybersecurity Is the New Safety Standard for Connected Cars

Cybersecurity Is the New Safety Standard for Connected Cars

by Nicole Spewak | Oct 16, 2025

Research shows that 70% would consider buying an older, less connected car to reduce cyber risk. Joseph M. Saunders shares more in Design & Development Today.
1«...345...»25
Guide to Creating and Utilizing SBOMs
RunSafe White and Orange Logo

 Headquarters: 1775 Tysons Blvd, Fifth Floor McLean, VA 22102
 Huntsville Regional Office: 850 Ben Graves Dr NW, Huntsville, AL 35816
EMEA Office: Agnes-Pockels-Bogen 1 80992 Munich, Germany
+1 (571) 441-5076
Sales@RunSafeSecurity.com

  • Platform
  • Partners
  • News
  • Blog
  • FAQ
  • Contact
  • Subscribe to Newsletter
  • Slack Community Channel
TALK TO AN EXPERT
ISO/IEC 27001 Certified

© Copyright 2026 RunSafe Security. All Rights Reserved.

Privacy Policy      Terms

  • Follow
  • Follow
  • Follow