The updated 2025 SBOM Minimum Elements from CISA and DHS introduces new guidance on what data and context...
Podcasts
Explore our latest podcast, Exploited: The Cyber Truth, where we expose real-world cyber threats and the strategies used to stop them—featuring bold conversations with top experts protecting critical infrastructure. You can also revisit episodes of our original series, Lessons from the School of Security Hard Knocks, where leaders reflect on hard-earned lessons from the frontlines of cybersecurity.
Collaboration in Cyberspace with Madison Horn
In this episode of Exploited: The Cyber Truth, host Paul Ducklin welcomes Madison Horn, National Security &...
Risk Reduction at the Core: Securing the Firmware Supply Chain
Firmware forms the foundation of all embedded and connected devices—but it’s often overlooked in cybersecurity...
When Machines Get Hacked: A Manufacturer’s Guide to Embedded Threats
Cyber adversaries are exploiting the weakest points in manufacturing—embedded devices, PLCs, and legacy systems that...
Weapons Cybersecurity: The Challenges Facing Aerospace and Defense
Modern weapons are no longer just hardware—they’re deeply connected, software-driven systems vulnerable to cyber...
Can Taiwan Survive a Digital Siege?
Taiwan faces millions of cyberattacks daily, and with nearly 90% of the world’s advanced semiconductors produced on...
Get In Touch With RunSafe
Get in touch with RunSafe to learn how our automated cybersecurity solutions can protect your embedded systems, reduce vulnerabilities, and ensure robust, continuous security for your mission-critical software.





