In today’s fast-paced defense environment, speed and intelligence win battles before they begin. In this...
Podcasts
Explore our latest podcast, Exploited: The Cyber Truth, where we expose real-world cyber threats and the strategies used to stop them—featuring bold conversations with top experts protecting critical infrastructure. You can also revisit episodes of our original series, Lessons from the School of Security Hard Knocks, where leaders reflect on hard-earned lessons from the frontlines of cybersecurity.
What the 2025 SBOM Minimum Elements Mean for Software Supply Chain Security
The updated 2025 SBOM Minimum Elements from CISA and DHS introduces new guidance on what data and context...
Collaboration in Cyberspace with Madison Horn
In this episode of Exploited: The Cyber Truth, host Paul Ducklin welcomes Madison Horn, National Security &...
Risk Reduction at the Core: Securing the Firmware Supply Chain
Firmware forms the foundation of all embedded and connected devices—but it’s often overlooked in cybersecurity...
When Machines Get Hacked: A Manufacturer’s Guide to Embedded Threats
Cyber adversaries are exploiting the weakest points in manufacturing—embedded devices, PLCs, and legacy systems that...
Weapons Cybersecurity: The Challenges Facing Aerospace and Defense
Modern weapons are no longer just hardware—they’re deeply connected, software-driven systems vulnerable to cyber...
Get In Touch With RunSafe
Get in touch with RunSafe to learn how our automated cybersecurity solutions can protect your embedded systems, reduce vulnerabilities, and ensure robust, continuous security for your mission-critical software.





