Videos

Explore a diverse range of expertly crafted videos covering Software Supply Chain Security, SBOM, Code Protections, Vulnerability Remediation, Cybersecurity Policy, and exclusive insights into RunSafe Security. Stay informed, enhance your cybersecurity knowledge, and stay ahead in the industry with these videos.

How LFR Technology Strengthens Security Without Slowing You Down

How LFR Technology Boosts Security with Minimal Runtime Impact

In this RunSafe Security Minute, we unpack the powerful security benefits of Load-time Function Randomization (LFR) technology. LFR takes system security to the next level by randomizing the memory locations of individual functions within a program, unlike traditional Address Space Layout Randomization (ASLR), which only relocates the entire program to a random memory address. This granular level of randomization makes it exponentially harder for attackers to exploit vulnerabilities based on known memory addresses or leaked information, significantly reducing the chances of successful attacks. The key advantage of LFR lies in its ability to perform this randomization with minimal impact on system performance. The randomization occurs once at load time, with the system shuffling and relocating functions before execution. Once the program is running, there are no additional runtime costs—meaning your software benefits from stronger protection without sacrificing speed or efficiency. This makes LFR a robust and efficient solution when looking to strengthen defenses without hindering performance.

How Crash Analysis Helps Detect and Prevent Cyberattacks | RunSafe Security Minute

Strengthening Cybersecurity with Crash Event Analysis

Software crashes are more than just inconvenient errors—they can be indicators of underlying vulnerabilities that attackers may exploit. By analyzing these crash events, organizations gain critical insights into potential weaknesses within their software. Crash analysis helps determine whether the failure stems from a simple coding error or if it signals a more serious security risk. For instance, a crash caused by a segmentation fault may expose memory issues that an attacker could manipulate to launch a future attack. Attackers often exploit these vulnerabilities by replicating the crash conditions to cause denial of service or extract sensitive data through error messages and temporary files. Moreover, patterns in crash events can reveal ongoing cyberattacks, such as when software interacts with unexpected data or behaves unpredictably. By studying the path attackers take, organizations can identify and patch vulnerabilities, strengthening their overall security posture. Incorporating crash analysis into your cybersecurity strategy not only helps detect and prevent attacks but also improves the resilience of your systems. Identifying and addressing these issues early on ensures that potential threats are neutralized before they can do any damage.

How RunSafe Ensures Mission Success in the DoD's Cyber Landscape

Proactive Cyber Defense for DoD Weapon Systems

In this RunSafe Security Minute, Dave dives into how RunSafe Security plays a critical role in ensuring the U.S. Department of Defense's mission success by securing complex embedded weapon systems. These systems often operate in environments where traditional cyber defenses are not feasible, making them vulnerable to both known and unknown threats. RunSafe addresses this challenge by implementing proactive, automated cyber resilience measures that eliminate memory safety issues during depot maintenance. This ensures that once these systems are deployed in the field, they remain protected from potential cyber attacks, including future zero-day vulnerabilities. Watch to learn how RunSafe's approach enhances the mission effectiveness of critical DoD systems.

How can RunSafe Security help reduce development disruption caused by unaddressed vulnerabilities?

Keeping Your Development on Track Despite Unaddressed Vulnerabilities

In today’s development process, teams often face a deluge of potential vulnerabilities uncovered through static and dynamic testing, as well as software bill of materials (SBOMs). These vulnerabilities can lead to significant delays if not addressed promptly, especially with policies that prevent shipping code with critical security issues. Shane explains how RunSafe Security steps in to mitigate these challenges. Instead of removing every vulnerability, RunSafe randomizes the memory layout at the binary level, making it extremely difficult for attackers to exploit vulnerabilities. RunSafe's technology injects runtime defenses into the software, neutralizing common attacks like buffer overflows. This approach protects your software from exploitation, allowing developers to focus on new features without delaying releases due to immediate security fixes. Additionally, RunSafe’s solutions offer peace of mind for asset owners and end-users, providing protection from exploitation even before patches are released. This proactive approach ensures that your development team can maintain momentum, delivering new features and updates on time while keeping your customers secure.

How does OMB influence cyber priorities and how can it help?

Understanding OMB's Role in Shaping Cybersecurity Priorities for Federal Agencies

The Office of Management and Budget (OMB) plays a pivotal role in establishing cybersecurity priorities across federal agencies. Doug, walks us through this important topic in this video. He details how OMB collaborates with the National Cyber Director to issue comprehensive guidance on budget proposals, ensuring they align with the President's cybersecurity objectives. These priorities include defending critical infrastructure, dismantling threat actors, and fostering resilient futures. Doug also highlights the integration of the CISA Zero Trust Maturity Model and the expansion of public-private partnerships, showcasing how OMB's influence strengthens the nation's cybersecurity posture.

Addressing National Cybersecurity Challenges: CISA’s Secure By Design Initiative

Addressing National Cybersecurity Challenges: CISA’s Secure By Design Initiative

Overview Discover how national cybersecurity is being fortified through proactive measures in our exclusive video, “Addressing National Cybersecurity Challenges: CISA’s Secure By Design Initiative.” Join us as we sit down with Kirsten Todd, President of Wondrous and former Chief of Staff at CISA, to delve into the motivations and strategies behind this critical initiative. Key Takeaways
  • Gain unique perspectives from Kirsten Todd on the Secure By Design initiative.
  • Understand how Secure By Design addresses vulnerabilities in software and hardware.
  • Learn about the collaboration between the federal government and the tech industry.
  • Hear about the imminent cybersecurity threats and measures to safeguard U.S. infrastructure.

Learn How Secure By Design is Shaping Cybersecurity

Equip yourself with the knowledge and strategies to contribute to a safer and more secure technological landscape. Don’t miss out on this opportunity to understand the importance of Secure By Design and how it’s shaping the future of national cybersecurity.

RunSafe Demonstration: Fortify Your Industrial Control Systems Against Critical Vulnerabilities

Protect Your Industrial Control Systems from Critical Exploits

In an era where industrial control systems (ICS) are increasingly interconnected, the risk of cyber exploits has never been greater. One such threat is CVE-2020-8597, a 9.8 critical buffer overflow vulnerability in the Point-to-Point Protocol Daemon (PPPD). This flaw, though discovered just four years ago, actually existed for 17 years before it was identified. Despite its age, it continues to jeopardize a wide range of ICS devices and other Linux-based systems, leaving them exposed to remote code execution attacks. At RunSafe Security, we understand the importance of protecting these vital systems. Our advanced security solutions are designed to prevent such vulnerabilities from being exploited. In this live demonstration, we take a real-world approach by using a BeagleBone Black device as a stand-in for actual industrial control hardware. You'll see a side-by-side comparison of an unprotected system—vulnerable to a successful exploit—and a system fortified with RunSafe’s protections. The results are clear: while an unprotected system allows an attacker to gain control and execute malicious code, our protected system effectively thwarts the exploit, preventing the adversary from achieving their objective. Whether it's creating unauthorized files, modifying sensor data, or altering device calibrations, the potential for damage in unprotected systems is immense. RunSafe's technology provides a robust defense, ensuring that your control systems remain secure against even the most persistent threats.

How is RunSafe Security complementary to OT security companies such as Nozomi Networks, Dragos, and Claroty?

How RunSafe Security Enhances OT Security

RunSafe Security complements OT security leaders such as Nozomi Networks, Claroty, Armis, Dragos, and Forescout, playing a pivotal role in addressing vulnerabilities within operational technology (OT) environments. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) highlighted vulnerabilities discovered by Armis, Claroty, and others in Honeywell Experion servers and stations. These vulnerabilities were linked to 13 Common Weakness Enumerations (CWEs). RunSafe Security can mitigate 10 of these CWEs, effectively addressing 70% of the identified vulnerabilities. While Honeywell has patched these vulnerabilities, integrating RunSafe's technology provides a more robust solution. RunSafe Security not only mitigates existing vulnerabilities but also proactively prevents future exploits, reducing the need for urgent security patches. By combining the threat detection and vulnerability discovery capabilities of Nozomi Networks, Armis, Claroty, Dragos, and Forescout with RunSafe Security's proactive vulnerability mitigation, we establish a comprehensive defense strategy. A potential collaboration here could ensure the safeguarding of critical infrastructures and secures our digital future.

How should the US counter the 50 to 1 manpower advantage China has over the US in cyberwarfare?

Overcoming the Odds: Empower Your Defense with RunSafe Security

During recent Congressional testimony, FBI Director Ray highlighted the daunting challenge posed by cyber warfare in his address to the House Select Committee on the Chinese Communist Party. Despite the potential of directing all FBI cyber assets toward countering China's hacking teams, they would still be outnumbered by an alarming 50-to-one ratio. This revelation underscores the urgent need for a strategic and innovative approach. Traditional methods of increasing manpower are insufficient to bridge such a significant gap. That's where RunSafe's techniques come into play, offering defenders a remarkable advantage in the face of overwhelming odds. At RunSafe, we introduce our advanced Cyber Defense Strategy using memory safety mitigation technology. Organizations using our programs have seen remarkable results. In just half an hour of implementation, they've achieved savings equivalent to four labor years. Imagine the transformative impact when applied across entire platforms! We are actively collaborating with esteemed partners like the Navy to demonstrate the unparalleled benefits of our approach. Through our research, we've found that RunSafe provides defenders with an astonishing 3,000-to-one advantage. This means they can redirect their focus from chasing individual bugs to strengthening vulnerabilities elsewhere, effectively neutralizing one of the most reliable attack vectors. With RunSafe's solutions, you can shift the balance of power in your favor against cyber threats. Liberate your resources to tackle more challenging endeavors and stay ahead in the dynamic landscape of cyber warfare. Empower your defense with RunSafe and safeguard your organization's digital assets effectively. Don't succumb to overwhelming odds—take charge of your cybersecurity strategy today!

Highlight an existing memory-based exploit and how RunSafe would prevent it from working.

Understanding and Mitigating Memory-Based Exploits with RunSafe

CVE-2020-8597 is a critical buffer overflow vulnerability found in the Point-to-Point Protocol Daemon (PPPD), affecting versions 2.4.2 to 2.4.8. This exploit is especially dangerous due to the widespread use of PPPD in many embedded Linux distributions, including Debian and Ubuntu. Despite the seemingly small range of affected versions, this vulnerability poses a significant threat because the software is a stable stack that doesn't receive frequent updates. Consequently, it has been around for 17 years, embedding itself in numerous systems. PPPD's vulnerability is a classic buffer overflow, allowing attackers to execute arbitrary code and take control of the system. The severity of this exploit is underscored by its CVSS V3 score of 9.8, classifying it as critical. Notably, the vulnerability affects not just a few software versions but also over 19 vendors, including Siemens, Wind River Linux, Sierra Wireless, OpenWRT, and even Android. What makes this exploit particularly dangerous is its simplicity. Some Linux-based builds, like Yocto and Wind River, lack basic protections such as compiling with position-independent code, making exploitation straightforward. Reliable working exploits for this vulnerability are readily available online, posing a significant risk to unprotected systems. RunSafe addresses these critical vulnerabilities by removing the attacker's ability to execute return-oriented programming (ROP) gadgets. This method ensures that even if a buffer overflow exists, the attacker cannot run arbitrary code in the process space. By deploying RunSafe's solutions, vulnerabilities like CVE-2020-8597 are effectively mitigated.

Highlight some fun problems to solve when you converted RunSafe code from C++ to rust.

Embracing Rust: RunSafe Code's Transition from C++ for Enhanced Stability and Safety

In our search for enhanced stability and safety, RunSafe Code, or Load-time Function Randomization (LFR), recently underwent a significant transition from C++ to Rust programming. We recognized the inherent advantages Rust offers over traditional C++ programming, particularly in terms of memory safety. Our transition to Rust allowed us to address critical issues surrounding memory unsafety, particularly concerning raw memory access. By leveraging Rust's language benefits, we meticulously adjusted memory permissions and organized byte slices, ensuring safer interactions with the process's memory space. Moreover, by sharing the same implementation across multiple phases of LFR, we've effectively reduced the size of our codebase while improving overall code coverage and robustness. One of the highlights of our transition was our rigorous testing methodology, where we compared Rust and C++ implementations to maintain byte-for-byte accuracy. By running both implementations in the same process and scrutinizing the entire memory space, we rapidly identified and addressed any discrepancies, ensuring a seamless transition. Embrace the future of programming languages by staying up-to-date on the newest RunSafe Security Minute. Dive deeper into our journey of transitioning RunSafe Code to Rust for enhanced stability and safety.

What are good use cases of RunSafe technology in the automotive sector?

Transforming Automotive Security

In today's automotive industry, vehicles are more than mere transportation—they're complex systems reliant on software and connectivity. This evolution presents new challenges, particularly in terms of cybersecurity. RunSafe emerges as a pivotal innovator in fortifying embedded systems within automobiles. With regulatory mandates like regulations R155 and R156 in Europe emphasizing cybersecurity, RunSafe steps in to seamlessly integrate advanced cyber defenses into automotive systems. RunSafe provides a comprehensive approach to address vulnerabilities, from software bill of materials (SBOM) to vulnerability identification and mitigation. By partnering with RunSafe, automakers can ensure the safety of their consumers and reinforce confidence in their products. RunSafe not only protects against potential cyber threats but also enhances the overall security posture of automobiles, making roads safer for everyone. With RunSafe, the automotive industry gains a competitive edge in addressing digital security challenges. By prioritizing security without compromising functionality, RunSafe ensures that automobiles remain at the forefront of innovation and safety.