Videos – RunSafe Security https://runsafesecurity.com Fri, 14 Nov 2025 18:04:58 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 https://runsafesecurity.com/wp-content/uploads/2024/09/cropped-RunSafe_Logo_Favicon_2024-32x32.png Videos – RunSafe Security https://runsafesecurity.com 32 32 How RunSafe Protects VxWorks Systems from URGENT/11 Exploits https://runsafesecurity.com/resources/video/urgent11-vxworks-demo/ Fri, 14 Nov 2025 18:04:58 +0000 https://runsafesecurity.com/?post_type=video&p=255256 Stopping URGENT/11 Attacks with RunSafe Protect In this demo, we show how RunSafe Protect defends VxWorks-based embedded systems from URGENT/11 memory safety exploits. You’ll see a vulnerable system challenged by a simulated attack and then observe how RunSafe’s protections—like memory randomization and moving target defense—disrupt the exploit and prevent attackers from taking control. This demo […]

The post How RunSafe Protects VxWorks Systems from URGENT/11 Exploits appeared first on RunSafe Security.

]]>
Stopping URGENT/11 Attacks with RunSafe Protect

In this demo, we show how RunSafe Protect defends VxWorks-based embedded systems from URGENT/11 memory safety exploits. You’ll see a vulnerable system challenged by a simulated attack and then observe how RunSafe’s protections—like memory randomization and moving target defense—disrupt the exploit and prevent attackers from taking control.

This demo highlights how RunSafe strengthens embedded software, mitigates known and future vulnerabilities, and ensures critical systems remain secure without altering functionality or slowing development.

The post How RunSafe Protects VxWorks Systems from URGENT/11 Exploits appeared first on RunSafe Security.

]]>
RunSafe Security in 2 Minutes: Protecting Critical Software https://runsafesecurity.com/resources/video/runsafe-under-2-minutes/ Tue, 11 Nov 2025 17:41:02 +0000 https://runsafesecurity.com/?post_type=video&p=255226 Inside RunSafe: A Quick Look at Our Mission, Platform, and Impact RunSafe Security is dedicated to protecting the world’s most critical software across defense, infrastructure, automotive, and medical systems. In this video, you’ll see how our platform delivers a secure-by-design approach that stops vulnerabilities before they can be exploited. From identifying hidden risks and generating […]

The post RunSafe Security in 2 Minutes: Protecting Critical Software appeared first on RunSafe Security.

]]>
Inside RunSafe: A Quick Look at Our Mission, Platform, and Impact

RunSafe Security is dedicated to protecting the world’s most critical software across defense, infrastructure, automotive, and medical systems. In this video, you’ll see how our platform delivers a secure-by-design approach that stops vulnerabilities before they can be exploited. From identifying hidden risks and generating Software Bills of Materials (SBOMs) to hardening software at build-time and runtime, RunSafe ensures that critical systems remain resilient, reliable, and secure. By integrating our Identify, Protect, and Monitor capabilities, we give organizations the tools to proactively defend against attacks across the entire software supply chain.

Our mission is clear: neutralize the vulnerabilities attackers rely on, enabling safe and uninterrupted operations across industries where security and reliability are non-negotiable. RunSafe’s platform not only automates embedded security but also provides real-time visibility into software health, helping teams maintain strong security posture without slowing innovation. Trusted by organizations around the globe, RunSafe proves that comprehensive cybersecurity can be both powerful and seamless—making every system, every product, and every mission more resilient.

The post RunSafe Security in 2 Minutes: Protecting Critical Software appeared first on RunSafe Security.

]]>
Using Binary Analysis to Quantify Potential Zero-Day Risk with Doug Britton https://runsafesecurity.com/resources/video/threatcon-zero-day-risk/ Fri, 24 Oct 2025 17:03:47 +0000 https://runsafesecurity.com/?post_type=video&p=255146 What if You Could Protect Software Before the Next Zero Day Is Discovered? Zero-day vulnerabilities are the hidden threat lurking in every software stack. In this THREATCON1 session, Doug Britton explains how organizations can use binary analysis to quantify potential zero-day risk and stop memory safety exploits. Through the lens of Return-Oriented Programming (ROP) and […]

The post Using Binary Analysis to Quantify Potential Zero-Day Risk with Doug Britton appeared first on RunSafe Security.

]]>
What if You Could Protect Software Before the Next Zero Day Is Discovered?

Zero-day vulnerabilities are the hidden threat lurking in every software stack. In this THREATCON1 session, Doug Britton explains how organizations can use binary analysis to quantify potential zero-day risk and stop memory safety exploits.

Through the lens of Return-Oriented Programming (ROP) and memory safety, Doug shows how modern attackers chain small fragments of legitimate code to escalate privileges or execute remote commands and how binary-level randomization stops them cold.

Highlights:

  • Understand how ROP chains enable zero-day exploits
  • Learn how to measure the “attack surface” of compiled binaries
  • See why memory safety bugs drive zero-day risk in embedded software
  • Learn how fine-grained memory function randomization neutralizes exploitability

Watch the full session to learn more.

Interested in seeing your zero-day exposure? RunSafe offers a Risk Reduction Analysis based on the topic of this talk. Analyze your binary here.

Watch all THREATCON1 content here: https://www.threatcon1.org/registration

The post Using Binary Analysis to Quantify Potential Zero-Day Risk with Doug Britton appeared first on RunSafe Security.

]]>
What does 100% coverage for VxWorks mean, and why is it important for embedded systems security? https://runsafesecurity.com/resources/video/vxworks-100-percent-coverage/ Wed, 17 Sep 2025 13:38:03 +0000 https://runsafesecurity.com/?post_type=video&p=254931 What “100% coverage” for VxWorks Means — and Why It Stops Exploits In this RunSafe Security Minute, Shane Fry, RunSafe’s CTO, answers a critical question for embedded systems security: what does “100% coverage” for VxWorks actually mean, and why should teams care?  Historically, defenses focused on user-space code and application DKMs, but for many VxWorks […]

The post What does 100% coverage for VxWorks mean, and why is it important for embedded systems security? appeared first on RunSafe Security.

]]>
What “100% coverage” for VxWorks Means — and Why It Stops Exploits

In this RunSafe Security Minute, Shane Fry, RunSafe’s CTO, answers a critical question for embedded systems security: what does “100% coverage” for VxWorks actually mean, and why should teams care? 

Historically, defenses focused on user-space code and application DKMs, but for many VxWorks systems the majority of the exploitable attack surface lives in the kernel. RunSafe pushed protections earlier in the boot and extended randomization so it covers both kernel and application code. The result: RunSafe’s protections eliminate essentially all usable ROP (return-oriented programming) gadgets an attacker would rely on. 

Even if an attacker can write over memory or drop code on the stack, they can’t predict where code lives, so memory-corruption techniques fail. This approach makes VxWorks systems far more resilient to real-world exploitation with minimal developer disruption.

The post What does 100% coverage for VxWorks mean, and why is it important for embedded systems security? appeared first on RunSafe Security.

]]>
Why is it critical to enrich SBOMs with proprietary component details like licensing and supplier info? https://runsafesecurity.com/resources/video/sbom-licensing-supplier-update/ Wed, 10 Sep 2025 12:22:14 +0000 https://runsafesecurity.com/?post_type=video&p=254854 Why Proprietary Component Details Are Critical in SBOMs Software Bills of Materials (SBOMs) are essential for visibility into your software supply chain—but many miss a critical piece: proprietary component details. Licensing terms, authorship, and supplier information often sit outside the codebase, making them difficult to capture. In this RunSafe Security Minute, Kelli Schwalm, Director of […]

The post Why is it critical to enrich SBOMs with proprietary component details like licensing and supplier info? appeared first on RunSafe Security.

]]>
Why Proprietary Component Details Are Critical in SBOMs

Software Bills of Materials (SBOMs) are essential for visibility into your software supply chain—but many miss a critical piece: proprietary component details. Licensing terms, authorship, and supplier information often sit outside the codebase, making them difficult to capture.

In this RunSafe Security Minute, Kelli Schwalm, Director of SBOM at RunSafe Security, highlights why these details matter for compliance, provenance, and consumer trust. She also connects these insights to RunSafe’s August product update, which expanded the flexibility of our SBOM configuration file. Now, teams can define proprietary components once, automatically enrich every SBOM with license and supplier data, and reuse the config file across builds—making SBOM generation accurate, repeatable, and efficient.

The post Why is it critical to enrich SBOMs with proprietary component details like licensing and supplier info? appeared first on RunSafe Security.

]]>
SBOMs for Embedded Systems: Solving the C/C++ Visibility Problem https://runsafesecurity.com/resources/video/c-cpp-sboms-embedded-systems/ Wed, 13 Aug 2025 15:18:06 +0000 https://runsafesecurity.com/?post_type=video&p=254619 Generate Complete C/C++ SBOMs Without the Headaches Software Bills of Materials (SBOMs) are now a critical requirement for software security and regulatory compliance. But for C and C++—especially in embedded systems—hidden dependencies, legacy code, and opaque build artifacts can leave dangerous blind spots. In just 60 seconds, discover how RunSafe Security eliminates these challenges. Our […]

The post SBOMs for Embedded Systems: Solving the C/C++ Visibility Problem appeared first on RunSafe Security.

]]>
Generate Complete C/C++ SBOMs Without the Headaches

Software Bills of Materials (SBOMs) are now a critical requirement for software security and regulatory compliance. But for C and C++—especially in embedded systems—hidden dependencies, legacy code, and opaque build artifacts can leave dangerous blind spots.

In just 60 seconds, discover how RunSafe Security eliminates these challenges. Our platform captures complete, exportable SBOMs for C/C++ without requiring a package manager. Integrated directly into your CI/CD pipeline, our solution delivers accurate dependency mapping, vulnerability insights, and the clarity you need to secure your software supply chain.

The post SBOMs for Embedded Systems: Solving the C/C++ Visibility Problem appeared first on RunSafe Security.

]]>
Secure Automotive Software from Source to Runtime https://runsafesecurity.com/resources/video/automotive-cybersecurity-protection/ Wed, 06 Aug 2025 11:21:34 +0000 https://runsafesecurity.com/?post_type=video&p=254590 Memory Safety for ECUs, ADAS & More In an era where software defines vehicle safety, the rise in automotive vulnerabilities is alarming. With over 530 CVEs affecting automotive systems in 2024, OEMs and suppliers must rethink how they build and protect software. This video introduces the RunSafe Security Platform, built to secure automotive software from […]

The post Secure Automotive Software from Source to Runtime appeared first on RunSafe Security.

]]>
Memory Safety for ECUs, ADAS & More

In an era where software defines vehicle safety, the rise in automotive vulnerabilities is alarming. With over 530 CVEs affecting automotive systems in 2024, OEMs and suppliers must rethink how they build and protect software.

This video introduces the RunSafe Security Platform, built to secure automotive software from the start of development through deployment and beyond.

What you’ll learn:

  • Why automotive software is increasingly targeted

  • How RunSafe helps you Identify vulnerabilities with real-time SBOM generation and risk quantification

  • How memory safety protections like memory relocation defend against exploits

  • How to monitor runtime behavior to catch crashes and attack signals

  • Which systems benefit: ECUs, ADAS, infotainment, and more

Stop the exploit before it happens. Start with a Risk Reduction Analysis. 

The post Secure Automotive Software from Source to Runtime appeared first on RunSafe Security.

]]>
How does RunSafe Protect enable memory attack mitigation on QNX and VxWorks 7 without requiring source code changes or performance trade-offs? https://runsafesecurity.com/resources/video/memory-safety-qnx-vxworks/ Fri, 01 Aug 2025 10:58:31 +0000 https://runsafesecurity.com/?post_type=video&p=254582 Advanced Memory Protection for QNX and VxWorks—No Code Changes Required In this RunSafe Security Minute, John Michael, Senior Software Engineer at RunSafe Security, outlines how RunSafe Protect delivers fine-grained memory attack mitigation on QNX and VxWorks 7—without modifying application source code or introducing significant runtime overhead. By leveraging Load-time Function Randomization (LFR), RunSafe Protect defeats […]

The post How does RunSafe Protect enable memory attack mitigation on QNX and VxWorks 7 without requiring source code changes or performance trade-offs? appeared first on RunSafe Security.

]]>
Advanced Memory Protection for QNX and VxWorks—No Code Changes Required

In this RunSafe Security Minute, John Michael, Senior Software Engineer at RunSafe Security, outlines how RunSafe Protect delivers fine-grained memory attack mitigation on QNX and VxWorks 7—without modifying application source code or introducing significant runtime overhead.

By leveraging Load-time Function Randomization (LFR), RunSafe Protect defeats memory corruption techniques that rely on predicting function locations in memory. Unlike Address Space Layout Randomization (ASLR), LFR works at a more granular level, reducing risk from information leaks. The setup process is simple—just a one-line change to your makefile or a quick install script—and supports a wide range of legacy and custom build systems.

RunSafe’s wrapper utility handles metadata generation at build time, minimizing startup impact and preserving application performance. Once randomization is complete, your code runs just as before—but now with added protection from modern memory-based exploits.

The post How does RunSafe Protect enable memory attack mitigation on QNX and VxWorks 7 without requiring source code changes or performance trade-offs? appeared first on RunSafe Security.

]]>
Why is support for QNX and VxWorks 7 in RunSafe Protect such a critical addition for memory safety in embedded systems? https://runsafesecurity.com/resources/video/qnx-vxworks7-memory-safety-support/ Wed, 23 Jul 2025 15:19:49 +0000 https://runsafesecurity.com/?post_type=video&p=254509 Why QNX and VxWorks 7 Matter for Embedded System Memory Safety RunSafe Security is expanding its memory safety protections to support QNX, VxWorks 6.9, and VxWorks 7—two of the most widely used real-time operating systems (RTOS) in embedded systems today. In this RunSafe Security Minute video, Senior Software Engineer Christopher explains why this update is […]

The post Why is support for QNX and VxWorks 7 in RunSafe Protect such a critical addition for memory safety in embedded systems? appeared first on RunSafe Security.

]]>
Why QNX and VxWorks 7 Matter for Embedded System Memory Safety

RunSafe Security is expanding its memory safety protections to support QNX, VxWorks 6.9, and VxWorks 7—two of the most widely used real-time operating systems (RTOS) in embedded systems today. In this RunSafe Security Minute video, Senior Software Engineer Christopher explains why this update is essential for securing critical infrastructure.

These RTOS platforms are often deployed in high-stakes environments like spacecraft, airplanes, power plants, vehicles, and medical devices. As such, they are prime targets for attackers. Adding to the challenge, these systems frequently go unpatched for long periods—or forever—due to their long lifespans and operational constraints.

Compounding the issue, many legacy platforms can’t support modern security tools like Rust or ASLR. RunSafe’s memory safety protections help close these gaps by shielding vulnerable embedded systems from exploits, even when traditional patching or security solutions aren’t viable.

The post Why is support for QNX and VxWorks 7 in RunSafe Protect such a critical addition for memory safety in embedded systems? appeared first on RunSafe Security.

]]>
What was causing instability in C++ SBOM generation on Windows, and how has RunSafe resolved it in the latest update? https://runsafesecurity.com/resources/video/cpp-sbom-generation-windows-fix/ Wed, 16 Jul 2025 14:05:58 +0000 https://runsafesecurity.com/?post_type=video&p=254467 How RunSafe Resolved C++ SBOM Instability on Windows In this RunSafe Security Minute, Senior Software Engineer Kelli explains a significant improvement in the C++ SBOM generation process for Windows. Previously, RunSafe’s SBOM generator used a third-party tool to track system processes during C/C++ compilation. However, this tool required a specific order of events to capture […]

The post What was causing instability in C++ SBOM generation on Windows, and how has RunSafe resolved it in the latest update? appeared first on RunSafe Security.

]]>
How RunSafe Resolved C++ SBOM Instability on Windows In this RunSafe Security Minute, Senior Software Engineer Kelli explains a significant improvement in the C++ SBOM generation process for Windows.

Previously, RunSafe’s SBOM generator used a third-party tool to track system processes during C/C++ compilation. However, this tool required a specific order of events to capture process data, leading to a race condition. Some child processes would complete their work before the tool could recognize them resulting in incomplete SBOMs.

To resolve this, the RunSafe team replaced the dependency and implemented a lower-level system that detects new processes the instant they’re created. This ensures more accurate, complete C++ SBOMs and better post-processing.

This update reinforces RunSafe’s commitment to software transparency and build integrity—especially in embedded systems and critical infrastructure applications.

The post What was causing instability in C++ SBOM generation on Windows, and how has RunSafe resolved it in the latest update? appeared first on RunSafe Security.

]]>
What does RunSafe Security do? https://runsafesecurity.com/resources/video/what-runsafe-does/ Wed, 09 Jul 2025 10:35:56 +0000 https://runsafesecurity.com/?post_type=video&p=254453 Protecting Software at the Core of Critical Infrastructure RunSafe Security is redefining how organizations protect the software that drives critical infrastructure. In this video, Joe Saunders, CEO of RunSafe Security, explains the company’s mission: to identify vulnerabilities within software—including those in the software supply chain—and protect deployed applications through automated, efficient solutions. RunSafe empowers developers […]

The post What does RunSafe Security do? appeared first on RunSafe Security.

]]>
Protecting Software at the Core of Critical Infrastructure RunSafe Security is redefining how organizations protect the software that drives critical infrastructure. In this video, Joe Saunders, CEO of RunSafe Security, explains the company’s mission: to identify vulnerabilities within software—including those in the software supply chain—and protect deployed applications through automated, efficient solutions. RunSafe empowers developers to build and deploy resilient systems without compromising speed or introducing complexity. By combining vulnerability detection with automated protections, RunSafe shifts the software’s attack surface, disrupting common exploitation techniques and increasing resilience at scale. From embedded systems to industrial control systems, RunSafe plays a pivotal role in securing operations that can’t afford to fail.

The post What does RunSafe Security do? appeared first on RunSafe Security.

]]>
Why IT/OT Convergence Increases Cyber Risk in Critical Infrastructure https://runsafesecurity.com/resources/video/it-ot-cyber-risk-critical-infrastructure/ Sun, 29 Jun 2025 01:21:44 +0000 https://runsafesecurity.com/?post_type=video&p=254425 The Risks of Connecting Legacy OT to Modern IT Networks As critical infrastructure evolves, so do the threats targeting it. One of the biggest shifts in recent years is the convergence of IT (Information Technology) and OT (Operational Technology) systems. While this integration improves visibility and remote management, it also expands the attack surface in […]

The post Why IT/OT Convergence Increases Cyber Risk in Critical Infrastructure appeared first on RunSafe Security.

]]>
The Risks of Connecting Legacy OT to Modern IT Networks

As critical infrastructure evolves, so do the threats targeting it. One of the biggest shifts in recent years is the convergence of IT (Information Technology) and OT (Operational Technology) systems. While this integration improves visibility and remote management, it also expands the attack surface in significant ways.

In this short video, RunSafe Security CTO explains:

  • Why OT systems were never designed for network connectivity

  • How post-COVID remote work accelerated OT exposure

  • What risks arise when legacy devices meet modern IT networks

  • Practical steps to reduce risk on both sides of the IT/OT line

Whether you’re managing industrial control systems, water treatment facilities, or power grids, this is a must-watch for security leaders navigating the blurred lines of IT and OT.

The post Why IT/OT Convergence Increases Cyber Risk in Critical Infrastructure appeared first on RunSafe Security.

]]>
Why Proactive Security Is Critical to Infrastructure Resilience https://runsafesecurity.com/resources/video/proactive-security-critical-infrastructure/ Wed, 25 Jun 2025 14:56:51 +0000 https://runsafesecurity.com/?post_type=video&p=254390 Proactive Cybersecurity: A Foundation for Resilient Infrastructure Proactive cybersecurity isn’t just a buzzword—it’s an essential strategy for securing critical infrastructure. In this video, Joe Saunders, Founder and CEO of RunSafe Security, shares his perspective on how moving beyond reactive security measures allows organizations to reduce operational disruptions, safeguard public services, and reallocate engineering resources to […]

The post Why Proactive Security Is Critical to Infrastructure Resilience appeared first on RunSafe Security.

]]>
Proactive Cybersecurity: A Foundation for Resilient Infrastructure Proactive cybersecurity isn’t just a buzzword—it’s an essential strategy for securing critical infrastructure. In this video, Joe Saunders, Founder and CEO of RunSafe Security, shares his perspective on how moving beyond reactive security measures allows organizations to reduce operational disruptions, safeguard public services, and reallocate engineering resources to innovation instead of constant vulnerability management. Joe emphasizes the broader impact: when infrastructure like water, energy, or data centers are disrupted, the consequences extend beyond business—they affect entire communities. By embracing proactive security strategies that prevent attacks before they begin, critical infrastructure systems can remain stable, reliable, and secure.

The post Why Proactive Security Is Critical to Infrastructure Resilience appeared first on RunSafe Security.

]]>
How RunSafe Builds Security Into Its Software: Embracing Secure by Design for OT Systems https://runsafesecurity.com/resources/video/secure-by-design-for-ot/ Wed, 18 Jun 2025 17:58:29 +0000 https://runsafesecurity.com/?post_type=video&p=254368 Building Resilient OT Systems Starts with Secure Software In this video, Shane Fry, Chief Technology Officer at RunSafe Security, discusses the company’s proactive approach to Secure by Design and what it means for operational technology (OT) manufacturers.  Long before signing the CISA Secure by Design pledge, RunSafe had already begun rewriting critical components of its […]

The post How RunSafe Builds Security Into Its Software: Embracing Secure by Design for OT Systems appeared first on RunSafe Security.

]]>
Building Resilient OT Systems Starts with Secure Software In this video, Shane Fry, Chief Technology Officer at RunSafe Security, discusses the company’s proactive approach to Secure by Design and what it means for operational technology (OT) manufacturers.  Long before signing the CISA Secure by Design pledge, RunSafe had already begun rewriting critical components of its software in memory-safe languages like Rust and implementing architecture changes to prevent exploitability. Shane explains why a security company must never become the attack vector—especially when protecting critical infrastructure—and how RunSafe’s ongoing enhancements reflect a deeper commitment to building resilient, secure products from the ground up. He also touches on the increasing convergence of IT and OT networks and why a Secure by Design mindset is vital in the face of incidents like the American Water attack.

The post How RunSafe Builds Security Into Its Software: Embracing Secure by Design for OT Systems appeared first on RunSafe Security.

]]>
Mitigating Zero-Day Risks in Critical Infrastructure with RunSafe https://runsafesecurity.com/resources/video/zero-day-risk-critical-infrastructure/ Wed, 11 Jun 2025 14:59:33 +0000 https://runsafesecurity.com/?post_type=video&p=254235 Eliminate Zero-Day Vulnerabilities Before They Strike Zero-day vulnerabilities are one of the most pressing challenges facing product security leaders—especially in critical infrastructure environments where the impact of an exploit can be severe. In this video, RunSafe Security CSO Doug Britton explains why chasing individual bugs is no longer an effective strategy, and how RunSafe helps […]

The post Mitigating Zero-Day Risks in Critical Infrastructure with RunSafe appeared first on RunSafe Security.

]]>
Eliminate Zero-Day Vulnerabilities Before They Strike Zero-day vulnerabilities are one of the most pressing challenges facing product security leaders—especially in critical infrastructure environments where the impact of an exploit can be severe. In this video, RunSafe Security CSO Doug Britton explains why chasing individual bugs is no longer an effective strategy, and how RunSafe helps organizations take a more proactive approach to reducing exposure. By eliminating entire classes of vulnerabilities through memory safety protections and runtime defenses, RunSafe enables teams to mitigate risk before threats are discovered. Doug also shares how RunSafe provides rigorous analysis to help organizations quantify their zero-day exposure reduction—giving security leaders confidence in their protections and the ability to demonstrate measurable improvements to customers and stakeholders.

The post Mitigating Zero-Day Risks in Critical Infrastructure with RunSafe appeared first on RunSafe Security.

]]>
How RunSafe Solves the Critical Memory Safety Problem in Infrastructure Security https://runsafesecurity.com/resources/video/solving-memory-safety-vulnerabilities/ Wed, 04 Jun 2025 15:34:07 +0000 https://runsafesecurity.com/?post_type=video&p=254178 Tackling 70% of Vulnerabilities in Critical Infrastructure What sparked the creation of RunSafe Security? Founder and CEO Joe Saunders breaks down the technical problem that prompted the formation of the company: memory safety vulnerabilities. These types of vulnerabilities make up nearly 70% of the attack surface in critical infrastructure systems, allowing adversaries to take control, […]

The post How RunSafe Solves the Critical Memory Safety Problem in Infrastructure Security appeared first on RunSafe Security.

]]>
Tackling 70% of Vulnerabilities in Critical Infrastructure What sparked the creation of RunSafe Security? Founder and CEO Joe Saunders breaks down the technical problem that prompted the formation of the company: memory safety vulnerabilities. These types of vulnerabilities make up nearly 70% of the attack surface in critical infrastructure systems, allowing adversaries to take control, crash systems, or steal data. Joe explains how RunSafe’s approach solves this problem asymmetrically—by preventing exploitation altogether. Instead of reacting to each threat, RunSafe proactively immunizes software, delivering a smarter, more secure way to protect embedded systems and critical infrastructure from widespread cyber risks.

The post How RunSafe Solves the Critical Memory Safety Problem in Infrastructure Security appeared first on RunSafe Security.

]]>
Future Trends in Aviation Cybersecurity https://runsafesecurity.com/resources/video/trends-aviation-cybersecurity/ Fri, 30 May 2025 16:04:35 +0000 https://runsafesecurity.com/?post_type=video&p=254159 Emerging Cybersecurity Standards Are Redefining Aviation Safety As cybersecurity becomes inseparable from safety in the aviation industry, new standards like DO-326 and DO-356 are driving critical changes in how avionics components are developed and maintained. These standards now require safety-certified systems to support updates—despite traditionally being designed for infrequent change. In this video, RunSafe Security’s […]

The post Future Trends in Aviation Cybersecurity appeared first on RunSafe Security.

]]>
Emerging Cybersecurity Standards Are Redefining Aviation Safety As cybersecurity becomes inseparable from safety in the aviation industry, new standards like DO-326 and DO-356 are driving critical changes in how avionics components are developed and maintained. These standards now require safety-certified systems to support updates—despite traditionally being designed for infrequent change. In this video, RunSafe Security’s Chief Strategy Officer explains why this shift is significant and how it impacts OEMs and avionics manufacturers. Updating safety-critical systems frequently introduces cost, complexity, and risk. That’s why forward-thinking companies are looking to built-in memory protection and runtime hardening—like RunSafe’s approach—to mitigate vulnerabilities in real-time and maintain operational safety between update cycles. If you’re working on avionics software, embedded systems, or regulatory compliance in aerospace, this video breaks down what’s next—and how to stay ahead.

The post Future Trends in Aviation Cybersecurity appeared first on RunSafe Security.

]]>
RunSafe’s Long-Term Vision for Securing Critical Infrastructure https://runsafesecurity.com/resources/video/vision-critical-infrastructure-cybersecurity/ Fri, 23 May 2025 13:47:21 +0000 https://runsafesecurity.com/?post_type=video&p=254070 How RunSafe Is Shaping the Future of Critical Infrastructure In this video, RunSafe Security Founder and CEO Joe Saunders shares his long-term vision for how the company is helping to reshape critical infrastructure security. His message is clear: resilience starts with secure software. Joe discusses how RunSafe’s approach—focused on memory safety, vulnerability mitigation, and software […]

The post RunSafe’s Long-Term Vision for Securing Critical Infrastructure appeared first on RunSafe Security.

]]>
How RunSafe Is Shaping the Future of Critical Infrastructure In this video, RunSafe Security Founder and CEO Joe Saunders shares his long-term vision for how the company is helping to reshape critical infrastructure security. His message is clear: resilience starts with secure software. Joe discusses how RunSafe’s approach—focused on memory safety, vulnerability mitigation, and software supply chain protection—can help operators of critical infrastructure reduce the risk of disruption and improve system reliability over time. The goal isn’t just to stop today’s threats but to future-proof the systems we rely on every day. Whether you’re securing legacy systems or deploying new infrastructure, RunSafe’s mission is to help you build a safer, stronger operational foundation through innovative software security solutions.

The post RunSafe’s Long-Term Vision for Securing Critical Infrastructure appeared first on RunSafe Security.

]]>
The Biggest Misconception People Have About Securing Embedded Systems https://runsafesecurity.com/resources/video/embedded-security-misconceptions/ Fri, 16 May 2025 10:39:57 +0000 https://runsafesecurity.com/?post_type=video&p=254026 Why “No Solution Exists” Is the Biggest Myth in Embedded Security In this video, RunSafe Security CTO Shane Fry addresses one of the most persistent myths in the world of embedded systems. Many think that there are no viable security solutions or that any attempt to secure devices will lead to operational disruption. Shane explains […]

The post The Biggest Misconception People Have About Securing Embedded Systems appeared first on RunSafe Security.

]]>
Why “No Solution Exists” Is the Biggest Myth in Embedded Security In this video, RunSafe Security CTO Shane Fry addresses one of the most persistent myths in the world of embedded systems. Many think that there are no viable security solutions or that any attempt to secure devices will lead to operational disruption. Shane explains why traditional antivirus tools are incompatible with systems like PLCs and why newer AI-based solutions often create more problems than they solve. He introduces a more practical approach: lightweight, low-impact security embedded at the firmware level with no added cognitive load. With RunSafe, device manufacturers can integrate protection without compromising performance, uptime, or user experience. Whether you’re securing water treatment facilities, oil and gas systems, or factory floor equipment, embedded security is not only possible, it’s practical.

The post The Biggest Misconception People Have About Securing Embedded Systems appeared first on RunSafe Security.

]]>
RunSafe’s Risk Reduction Analysis: Minimizing Zero-Day Risks https://runsafesecurity.com/resources/video/zero-day-risk-reduction-analysis/ Fri, 09 May 2025 15:24:58 +0000 https://runsafesecurity.com/?post_type=video&p=253983 Doug Britton Explains How RunSafe Shrinks Zero-Day Risk In this video, RunSafe Security’s Chief Strategy Officer, Doug Britton, explains how we tackle one of cybersecurity’s toughest challenges: quantifying and minimizing zero-day risk. Through our Risk Reduction Analysis, developed in collaboration with researchers in Sweden, we evaluate millions of potential code paths that could be exploited […]

The post RunSafe’s Risk Reduction Analysis: Minimizing Zero-Day Risks appeared first on RunSafe Security.

]]>
Doug Britton Explains How RunSafe Shrinks Zero-Day Risk In this video, RunSafe Security’s Chief Strategy Officer, Doug Britton, explains how we tackle one of cybersecurity’s toughest challenges: quantifying and minimizing zero-day risk. Through our Risk Reduction Analysis, developed in collaboration with researchers in Sweden, we evaluate millions of potential code paths that could be exploited to execute a memory-based attack. Doug shows how 99.99% of those paths are eliminated by applying RunSafe’s Load-time Function Randomization (LFR), reducing attacker options from millions to just dozens to prevent the exploit of memory-based zero days. This approach gives organizations clear, data-backed insight into their risk posture—even when facing unknown threats.

The post RunSafe’s Risk Reduction Analysis: Minimizing Zero-Day Risks appeared first on RunSafe Security.

]]>