In this episode of Exploited: The Cyber Truth, Paul Ducklin sits down with RunSafe Security CEO Joseph M....
Podcasts
Explore our latest podcast, Exploited: The Cyber Truth, where we expose real-world cyber threats and the strategies used to stop them—featuring bold conversations with top experts protecting critical infrastructure. You can also revisit episodes of our original series, Lessons from the School of Security Hard Knocks, where leaders reflect on hard-earned lessons from the frontlines of cybersecurity.
Balancing Speed and Security: The Open Source Dilemma in Embedded Development
Open source is everywhere in embedded development — from compilers and build tools to libraries pulled in to...
Beyond Defense: Building Cyber Resilience in Autonomous and Connected Mobility
Autonomous and connected mobility is reaching a critical inflection point. In this episode of Exploited: The...
2026 ICS Security Predictions: What’s Next for Critical Infrastructure
ICS security is approaching a turning point. In this predictions episode of Exploited: The Cyber Truth, RunSafe...
When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy & What’s Next
Modern vehicles are no longer defined by mechanical systems alone. They are always-connected, software-defined...
When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems
Open-source components unlock speed for engineering teams—but in embedded systems, a single licensing oversight...
Get In Touch With RunSafe
Get in touch with RunSafe to learn how our automated cybersecurity solutions can protect your embedded systems, reduce vulnerabilities, and ensure robust, continuous security for your mission-critical software.





