Videos

Explore a diverse range of expertly crafted videos covering Software Supply Chain Security, SBOM, Code Protections, Vulnerability Remediation, Cybersecurity Policy, and exclusive insights into RunSafe Security. Stay informed, enhance your cybersecurity knowledge, and stay ahead in the industry with these videos.

Top Cybersecurity Trends for Securing Critical Infrastructure in Space

3 Core Issues Shaping Space Cybersecurity

As cybersecurity threats expand beyond our atmosphere, the need to protect important systems becomes even more critical. Space infrastructure security is more important than ever as technology advances and we rely more on satellites for communication, navigation, weather forecasting, and other essential services. The increasing connection between space technology and industries like energy, transportation, agriculture, and telecommunications makes it vital to have strong cybersecurity in space. Recent events have shown how important it is to improve security in space. The conflict in Ukraine highlighted the risk to commercial satellites from cyber threats when Russia targeted them. This event made it clear that we need better security measures to protect our space infrastructure. Understanding the three main issues in space cybersecurity today is essential.

Link Between Space Technology and Critical Industries

Satellites are crucial for modern infrastructure – global communication networks, precision agriculture, and efficient transportation systems. Protecting these assets is not just about safeguarding data, but also ensuring that vital services relying on space infrastructure continue uninterrupted.

Rise of Hybrid Military and Commercial Networks

The combination of military and commercial satellite communications brings new challenges for security. Managing access controls, encryption protocols, and threat detection becomes more complex as military and civilian operations share satellite resources. It’s important to ensure data integrity and confidentiality in these networks to maintain national security and economic stability.

Economic Shift Towards Operational Expenses

Satellite maintenance is an ongoing, necessary expense. To keep them functioning properly, there must be cost-effective cybersecurity solutions that maintain performance and reliability without compromising protections. As satellites' lifespans increase and their capabilities grow, resources must be allocated to maintain and secure these assets throughout their lifecycle. At RunSafe Security, we understand the importance of optimizing space assets for efficiency and ensuring strong cybersecurity measures are in place. Our approach focuses on software-based solutions that minimize disruption to space infrastructure's physical characteristics. By prioritizing cybersecurity without sacrificing operational efficiency, we aim to provide comprehensive protection for critical infrastructure beyond Earth's atmosphere.

Revolutionizing Zero-day Exploit Protection: Hardening Code with Load-time Function Randomization

Defending Against the Unseen Threats

At RunSafe Security, our team has conducted extensive analysis to assess the efficacy of load-time function randomization, especially in the context of mitigating zero-day exploits, which are inherently unpredictable and pose significant threats to software systems. Our investigation began with rap gadgets, which serve as fundamental components akin to Lego pieces in an attacker's arsenal, particularly for targeting memory vulnerabilities. Through meticulous examination of thousands of open-source binaries, we meticulously extracted essential statistics pertaining to functions and ROM gadgets. We observed that the average binary comprises approximately 220 functions and over a thousand rap gadgets, averaging nearly 5 gadgets per function. Notably, a considerable number of functions lacked gadgets, with a staggering 95% having fewer than 30 gadgets. Out of the 245,000 functions scrutinized, only a mere handful possessed 500 or more gadgets. Subsequently, leveraging publicly available tools like Rapper, we endeavored to evaluate the presence of rap gates in the binaries. Our findings were revealing, indicating that 25% of these binaries harbored functioning chains capable of potentially granting unauthorized access to the device. This alarming discovery underscores the significance of addressing vulnerabilities, especially given that vulnerabilities occur at a rate of 7 to 12 per 1,000 lines of code, as highlighted by NIST and other reputable studies. Enter RunSafe Security: code hardening with load-time function randomization. With an average of 220 functions per binary, this approach results in an astronomical number of load combinations, approximately equivalent to 2.284 times 10 to the power of 420. The implications are profound, as this strategy significantly enhances entropy, thereby severely restricting an attacker's options. Instead of having access to a myriad of rap gadgets, attackers are confined to the gadgets within the specific vulnerable function, with an average of less than 5 per function. Upon conducting a thorough reassessment of the binaries, we made a remarkable discovery—none of them exhibited function-level rap chains. This outcome underscores the effectiveness of RunSafe's load-time function randomization in fortifying software systems against potential threats. This robust defense mechanism instills confidence, even in the face of future zero-day vulnerabilities, as systems protected by RunSafe's measures offer resilient protection, leaving attackers with minimal avenues for exploitation.

RSSM: What metrics does RunSafe provide as evidence of value?

Metrics Analysis, Vulnerability Mitigation, and Future-Proofing with RunSafe Insights

In any business environment, the utilization of metrics stands as a cornerstone for informed decision-making processes within the organization. At RunSafe, our unwavering commitment to memory safety and comprehensive protection underscores the critical need for gleaning customer metrics and insights during our software immunization assessment phase. This collaborative approach not only enriches our understanding of customer needs but also empowers us to tailor our solutions to address their specific challenges effectively. Our engagement with customers entails a deep dive into their software builds, wherein we conduct a thorough analysis across two pivotal dimensions of metrics. Firstly, we embark on a meticulous examination of the Software Bill of Materials (SBOM), unraveling any known vulnerabilities inherent in the current software build. This foundational step serves as the bedrock upon which our vulnerability mitigation strategies are built. Leveraging RunSafe's expertise in this domain, we implement advanced techniques aimed at fortifying the security posture of the software. Empirical evidence from academic research underscores the significant potential for mitigation rates ranging from 40 to 70%, a testament to the effectiveness of our collaborative efforts. This validation reinforces our commitment to delivering tangible results that mitigate risks and enhance the resilience of software systems. In tandem with vulnerability identification and mitigation, we adopt a forward-looking approach to address unknown or zero-day vulnerabilities. By scrutinizing the code structure and employing sophisticated randomization techniques, we proactively fortify the software against emerging threats, thereby future-proofing it for tomorrow's challenges. As we navigate the multifaceted landscape of software security metrics and solutions, let us delve into the intricacies of our dual-focused strategy, where current challenges converge with innovative solutions, ultimately shaping the resilience of code in the ever-evolving digital landscape. Join us as we collectively explore new horizons and redefine the boundaries of software security excellence.

RSSM: Software Development with Lynx and RunSafe – Enhance Efficiency and Mitigate Risks

Enhance Software Development Efficiency with Lynx and RunSafe's Synergistic Power.

Lynx Software Technologies’ (Lynx) clientele across aircraft manufacturers, industrial controls, defense systems, and IOT devices share a common goal: the reduction of costs, risks, and scheduling complexities. RunSafe is an all-encompassing solution that addresses these challenges in a unified package. It protects the LYNX MOSA.ic framework against 40-70% of the most common vulnerabilities with no developer impact. The seamless integration between RunSafe solutions and LYNX MOSA.ic streamlines processes, liberating clients from the burdens of labor-intensive bug chasing and emergency patch testing. Imagine reclaiming hundreds of labor years that were once dedicated to navigating the complexities of software development security patching. When managing cyber risks during software development, on-time deliveries, patch deployments, and developer efficiency often bear the brunt of unpredictable impacts. While software testing is undeniably essential, it doesn't capture every nuance. This is where RunSafe comes in – by residing on the customer's device, it proactively mitigates the majority of memory safety-related bugs, protecting against potential exploitation. The significance of this cannot be overstated. With RunSafe protections, developers are empowered to redirect their focus from constantly patching the latest bugs to enhancing software with value-added features. The result is a more streamlined and efficient software development experience that leverages the full potential of both the LYNX MOSA.ic framework and RunSafe solutions. Working with real-time operating systems provides extensive opportunities for innovation and risk. But with Lynx and RunSafe, innovation takes precedence over bug resolution, letting developers and product managers focus on creation rather than resolution. Lynx and RunSafe invite you to join them on this transformative journey to refocus software development on innovation. These cutting-edge solutions redefine the possibilities of software development. Embrace the power of synergy, efficiency, and risk mitigation – unlock a smoother and more productive software development experience with LYNX MOSA.ic and RunSafe at the forefront.

What are the differences between a build-time SBOM and a binary-based SBOM?

Unpacking SBOM Differences: Build-Time vs. Binary-Based Approaches

Binary-based SBOMs are praised for their convenience, particularly in situations where full source access is limited or when working with legacy packages. However, as the video highlights, they often fall short in capturing critical details such as version information and dependency tree mapping. This is where build-time SBOMs come to the forefront, demanding access to the full source during compilation but providing a wealth of information for creating more informed SBOMs. With a real-world example featuring the Heartbleed exploit, viewers will understand how selecting the right SBOM method can save precious time and reduce stress in the software development process. So, join us in this enlightening discussion on SBOM differences and discover why "build time" might be the way to go for the most informative SBOM. Don't miss this opportunity to enhance your understanding of software cataloging and security.

RunSafe Security Minute #1

RunSafe Security DevSecOps DCCyberWeek Highlight Video Final

A highlight reel about RunSafe Security's DevSecOps bash featuring Nicolas Chaillan, Chief Software Officer of the United States Air Force.

RunSafe Security Minute #2

RunSafe Security Minute #3

Yocto, RunSafe and Memory Threat Immunization

“A great threat has become a great opportunity” IIoT World editor-in-chief Lucian Fogoros recently interviewed RunSafe Chief Technology Officer Doug Britton and Andrew Murray, QA Ninja about the impact of the yocto project, the rising number of vulnerabilities in the IoT industry and effortless way adding Alkemist to a yocto project eliminates those vulnerabilities. Blog Post: http://run-safe-security.test/blog/5-minute-memory-threat-immunization-for-yocto-build-environments/

Ethan Secures Yocto Builds

Ethan Secures Yocto Builds

  • 1
  • 2