In this episode of Exploited: The Cyber Truth, Paul Ducklin sits down with RunSafe Security Founder and CEO Joseph...
Podcasts
Explore our latest podcast, Exploited: The Cyber Truth, where we expose real-world cyber threats and the strategies used to stop them—featuring bold conversations with top experts protecting critical infrastructure. You can also revisit episodes of our original series, Lessons from the School of Security Hard Knocks, where leaders reflect on hard-earned lessons from the frontlines of cybersecurity.
The OT Mistakes Attackers Count On—And How to Fix Them Before They Do
In this episode of Exploited: The Cyber Truth, Paul Ducklin sits down with RunSafe Security CEO Joseph M....
Balancing Speed and Security: The Open Source Dilemma in Embedded Development
Open source is everywhere in embedded development — from compilers and build tools to libraries pulled in to...
Beyond Defense: Building Cyber Resilience in Autonomous and Connected Mobility
Autonomous and connected mobility is reaching a critical inflection point. In this episode of Exploited: The...
2026 ICS Security Predictions: What’s Next for Critical Infrastructure
ICS security is approaching a turning point. In this predictions episode of Exploited: The Cyber Truth, RunSafe...
When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy & What’s Next
Modern vehicles are no longer defined by mechanical systems alone. They are always-connected, software-defined...
Get In Touch With RunSafe
Get in touch with RunSafe to learn how our automated cybersecurity solutions can protect your embedded systems, reduce vulnerabilities, and ensure robust, continuous security for your mission-critical software.





