In The News – RunSafe Security https://runsafesecurity.com Wed, 22 Jan 2025 15:45:19 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 https://runsafesecurity.com/wp-content/uploads/2024/09/cropped-RunSafe_Logo_Favicon_2024-32x32.png In The News – RunSafe Security https://runsafesecurity.com 32 32 Beyond Patching: Securing Medical Devices Postmarket https://www.healthcareittoday.com/2025/01/21/beyond-patching-securing-medical-devices-postmarket/#new_tab Wed, 22 Jan 2025 15:45:19 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=253180 What if there was an easier way to meet FDA guidance and to make patching of medical devices more efficient? RunSafe Founder and CEO Joe Saunders discusses strategies for exploit prevention in medical device software in Healthcare IT Today.

The post Beyond Patching: Securing Medical Devices Postmarket appeared first on RunSafe Security.

]]>
What if there was an easier way to meet FDA guidance and to make patching of medical devices more efficient?

RunSafe Founder and CEO Joe Saunders discusses strategies for exploit prevention in medical device software in Healthcare IT Today.

The post Beyond Patching: Securing Medical Devices Postmarket appeared first on RunSafe Security.

]]>
Safeguarding Critical Infrastructure Amid the Looming Threat of Cyber Attacks and Military Conflict https://thecyberwire.com/podcasts/daily-podcast/2217/notes#new_tab Fri, 03 Jan 2025 20:44:52 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=253163 The post Safeguarding Critical Infrastructure Amid the Looming Threat of Cyber Attacks and Military Conflict appeared first on RunSafe Security.

]]>
The post Safeguarding Critical Infrastructure Amid the Looming Threat of Cyber Attacks and Military Conflict appeared first on RunSafe Security.

]]>
RunSafe Security Platform enhances risk management with automation https://www.helpnetsecurity.com/2024/12/17/runsafe-security-platform/#new_tab Tue, 17 Dec 2024 20:42:35 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=253162 The post RunSafe Security Platform enhances risk management with automation appeared first on RunSafe Security.

]]>
The post RunSafe Security Platform enhances risk management with automation appeared first on RunSafe Security.

]]>
Salt Typhoon poses a serious supply chain risk to most organizations https://www.csoonline.com/article/3621674/salt-typhoon-poses-a-serious-supply-chain-risk-to-most-organizations.html#new_tab Wed, 11 Dec 2024 20:55:05 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=252947 Joe Saunders Highlights Growing Concern Over Salt Typhoon Cyber Threats RunSafe Security CEO Joe Saunders provided critical insights in a recent analysis of the Salt Typhoon cyberattacks, which have compromised U.S. telecommunications networks and posed significant supply chain risks. He highlighted how the group exploits memory-based vulnerabilities in telecom equipment, a tactic frequently used by […]

The post Salt Typhoon poses a serious supply chain risk to most organizations appeared first on RunSafe Security.

]]>
Joe Saunders Highlights Growing Concern Over Salt Typhoon Cyber Threats

RunSafe Security CEO Joe Saunders provided critical insights in a recent analysis of the Salt Typhoon cyberattacks, which have compromised U.S. telecommunications networks and posed significant supply chain risks. He highlighted how the group exploits memory-based vulnerabilities in telecom equipment, a tactic frequently used by advanced threat actors.

Saunders emphasized the need for organizations to engage telecom providers directly, urging them to eliminate these vulnerabilities and adopt proactive defenses. His comments align with the U.S. government’s broader push for stronger cybersecurity measures, particularly in critical infrastructure sectors.

For businesses and CISOs, Saunders’ advice underscores the importance of collaboration and resilience-building strategies to mitigate evolving cyber risks.

The post Salt Typhoon poses a serious supply chain risk to most organizations appeared first on RunSafe Security.

]]>
RunSafe CTO Shane Fry Speaks on Cybersecurity at Homeland Security Hearing https://www.youtube.com/watch?v=dpeu1dljrBk#new_tab https://www.youtube.com/watch?v=dpeu1dljrBk#new_tab#respond Fri, 06 Dec 2024 17:11:30 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=252923 RunSafe Security CTO Shane Fry shared his expertise at a hearing hosted by the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection. The hearing, titled “Design vs. Default: Analyzing Shifts in Cybersecurity,” brought together industry leaders, including representatives from Google and Fortinet, to discuss the evolving challenges in cybersecurity. During his remarks, Shane emphasized […]

The post RunSafe CTO Shane Fry Speaks on Cybersecurity at Homeland Security Hearing appeared first on RunSafe Security.

]]>
RunSafe Security CTO Shane Fry shared his expertise at a hearing hosted by the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection.

The hearing, titled “Design vs. Default: Analyzing Shifts in Cybersecurity,” brought together industry leaders, including representatives from Google and Fortinet, to discuss the evolving challenges in cybersecurity.

During his remarks, Shane emphasized the urgency of addressing existing vulnerabilities in both IT and OT systems. “Secure by Design is making a lot of waves, but we can’t lose sight of the fact that there is software today that is not secure,” he stated. “We have to do something about the software that is deployed today and ensure it includes operational technology systems as well.”

Explore more about RunSafe Security’s commitment to creating resilient systems and Shane Fry’s impactful insights.

The post RunSafe CTO Shane Fry Speaks on Cybersecurity at Homeland Security Hearing appeared first on RunSafe Security.

]]>
https://www.youtube.com/watch?v=dpeu1dljrBk#new_tab/feed/ 0
RunSafe Security’s Strategic Approach to Securing Embedded Devices Across Industries https://tfir.io/how-runsafe-security-is-securing-embedded-devices-across-industries/#new_tab https://tfir.io/how-runsafe-security-is-securing-embedded-devices-across-industries/#new_tab#respond Wed, 04 Dec 2024 22:27:28 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=252917 RunSafe Security, founded in 2018, is dedicated to enhancing cybersecurity across various industries by targeting persistent memory corruption vulnerabilities in embedded devices. Shane Fry, CTO of RunSafe Security, discusses the company’s evolution and its strategy to address security challenges in sectors such as aerospace, defense, and healthcare. RunSafe’s adaptable solutions are designed to fit specific […]

The post RunSafe Security’s Strategic Approach to Securing Embedded Devices Across Industries appeared first on RunSafe Security.

]]>
RunSafe Security, founded in 2018, is dedicated to enhancing cybersecurity across various industries by targeting persistent memory corruption vulnerabilities in embedded devices. Shane Fry, CTO of RunSafe Security, discusses the company’s evolution and its strategy to address security challenges in sectors such as aerospace, defense, and healthcare. RunSafe’s adaptable solutions are designed to fit specific industry needs and compliance requirements, including the generation and management of Software Bills of Materials (SBOMs). The firm’s technology, which also features a cloud-based platform for integrating security features seamlessly, plays a crucial role in protecting critical infrastructure against cyber threats. With recent significant growth and strategic expansions into new markets like automotive and aerospace, RunSafe is poised to continue its impact on global cybersecurity standards.

The post RunSafe Security’s Strategic Approach to Securing Embedded Devices Across Industries appeared first on RunSafe Security.

]]>
https://tfir.io/how-runsafe-security-is-securing-embedded-devices-across-industries/#new_tab/feed/ 0
Securing clients’ fleets: Unlocking new opportunities for MSPs https://smartermsp.com/securing-clients-fleets-unlocking-new-opportunities-for-msps/#new_tab Mon, 02 Dec 2024 20:40:28 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=253161 The post Securing clients’ fleets: Unlocking new opportunities for MSPs appeared first on RunSafe Security.

]]>
The post Securing clients’ fleets: Unlocking new opportunities for MSPs appeared first on RunSafe Security.

]]>
Nexus Podcast: Joe Saunders on Advanced Attacks Against Critical Infrastructure https://nexusconnect.io/podcasts/nexus-podcast-joe-saunders-on-advanced-attacks-against-critical-infrastructure#new_tab Wed, 13 Nov 2024 20:36:51 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=253159 The post Nexus Podcast: Joe Saunders on Advanced Attacks Against Critical Infrastructure appeared first on RunSafe Security.

]]>
The post Nexus Podcast: Joe Saunders on Advanced Attacks Against Critical Infrastructure appeared first on RunSafe Security.

]]>
Securing Critical Infrastructure: Key Principles for Operational Technology Cybersecurity https://industrialcyber.co/control-device-security/global-cybersecurity-agencies-release-comprehensive-guide-on-securing-critical-infrastructure-ot-systems/#new_tab https://industrialcyber.co/control-device-security/global-cybersecurity-agencies-release-comprehensive-guide-on-securing-critical-infrastructure-ot-systems/#new_tab#respond Thu, 07 Nov 2024 21:06:56 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=252731 A newly released guide by global cybersecurity agencies outlines six foundational principles for securing critical infrastructure OT (Operational Technology) systems, focusing on safety, data protection, network segmentation, secure supply chains, and a skilled workforce. RunSafe Security’s role aligns with these principles by safeguarding OT systems through advanced protection for valuable engineering configuration data, which is […]

The post Securing Critical Infrastructure: Key Principles for Operational Technology Cybersecurity appeared first on RunSafe Security.

]]>
A newly released guide by global cybersecurity agencies outlines six foundational principles for securing critical infrastructure OT (Operational Technology) systems, focusing on safety, data protection, network segmentation, secure supply chains, and a skilled workforce. RunSafe Security’s role aligns with these principles by safeguarding OT systems through advanced protection for valuable engineering configuration data, which is a critical asset in operational environments and highly targeted by adversaries due to its stability and long-lasting value.

The guide also emphasizes segmenting OT networks to shield them from more vulnerable IT networks, a strategy supported by RunSafe’s solutions that bolster network resilience and reduce risks from interconnectivity. Additionally, the guide underscores the need for a security-aware workforce, with personnel trained to detect and respond to cyber threats. RunSafe Security’s technologies enhance this principle by creating secure software environments, enabling OT teams to build stronger defenses and respond proactively, ensuring the protection of critical infrastructure from emerging cyber threats.

The post Securing Critical Infrastructure: Key Principles for Operational Technology Cybersecurity appeared first on RunSafe Security.

]]>
https://industrialcyber.co/control-device-security/global-cybersecurity-agencies-release-comprehensive-guide-on-securing-critical-infrastructure-ot-systems/#new_tab/feed/ 0
Meeting CISA’s Memory Safety Mandate: The Role of OT Software Buyers and Manufacturers https://www.cybersecurity-insiders.com/meeting-cisas-memory-safety-mandate-the-role-of-ot-software-buyers-and-manufacturers/#new_tab Thu, 07 Nov 2024 20:33:20 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=253158 The post Meeting CISA’s Memory Safety Mandate: The Role of OT Software Buyers and Manufacturers appeared first on RunSafe Security.

]]>
The post Meeting CISA’s Memory Safety Mandate: The Role of OT Software Buyers and Manufacturers appeared first on RunSafe Security.

]]>
Connected car security: Software complexity creates bumps in the road https://content.reversinglabs.com/learn-sscs-for-dummies/connected-car-cyber https://content.reversinglabs.com/learn-sscs-for-dummies/connected-car-cyber#respond Fri, 01 Nov 2024 15:56:51 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=252511 This article by Jaikumar Vijayan explores the cybersecurity challenges in connected cars, focusing on the risks created by complex software supply chains in modern vehicles. With cars increasingly relying on software for features like over-the-air updates and real-time monitoring, they become vulnerable to cyberattacks. High-profile hacks, such as the 2015 Jeep Cherokee incident, highlight the […]

The post Connected car security: Software complexity creates bumps in the road appeared first on RunSafe Security.

]]>
This article by Jaikumar Vijayan explores the cybersecurity challenges in connected cars, focusing on the risks created by complex software supply chains in modern vehicles. With cars increasingly relying on software for features like over-the-air updates and real-time monitoring, they become vulnerable to cyberattacks. High-profile hacks, such as the 2015 Jeep Cherokee incident, highlight the severity of these risks, especially when third-party or open-source software is involved.

The article discusses the recent U.S. regulatory efforts to limit foreign access to the automotive supply chain and the broader challenges of keeping vehicle software updated to mitigate vulnerabilities. Joe Saunders, co-founder and CTO of RunSafe Security, underscores the need for code scanning and software composition analysis (SCA) to identify and address risks early. He emphasizes that creating a Software Bill of Materials (SBOM) at build time is crucial for ensuring software integrity, while holistic approaches to application security are essential for building truly secure, trustworthy vehicle software. Emerging standards like UN WP.29 and ISO/SAE 21434 offer guidelines, but the automotive industry still requires more specific security frameworks.

The post Connected car security: Software complexity creates bumps in the road appeared first on RunSafe Security.

]]>
https://content.reversinglabs.com/learn-sscs-for-dummies/connected-car-cyber/feed/ 0
Memory safety vulnerabilities continue to plague ICS: Here’s what to do about it https://securitybrief.com.au/story/memory-safety-vulnerabilities-continue-to-plague-ics-here-s-what-to-do-about-it https://securitybrief.com.au/story/memory-safety-vulnerabilities-continue-to-plague-ics-here-s-what-to-do-about-it#respond Thu, 24 Oct 2024 13:15:20 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=252405 In his article “Memory Safety Vulnerabilities Continue to Plague ICS: Here’s What to Do About It,” Shane Fry, CTO of RunSafe Security, addresses the persistent issue of memory safety vulnerabilities in Industrial Control Systems (ICS). Despite decades of efforts to mitigate them, the number of vulnerabilities has surged, with over 3,000 CVEs reported in 2022 […]

The post Memory safety vulnerabilities continue to plague ICS: Here’s what to do about it appeared first on RunSafe Security.

]]>
In his article “Memory Safety Vulnerabilities Continue to Plague ICS: Here’s What to Do About It,” Shane Fry, CTO of RunSafe Security, addresses the persistent issue of memory safety vulnerabilities in Industrial Control Systems (ICS). Despite decades of efforts to mitigate them, the number of vulnerabilities has surged, with over 3,000 CVEs reported in 2022 alone. These vulnerabilities, especially prevalent due to the use of C/C++ languages, threaten critical infrastructure and demand immediate attention.

Shane highlights the growing concern from government agencies like the NSA and CISA, as well as EU regulations pushing for secure-by-design principles and the use of Software Bills of Materials (SBOMs). However, the transition to memory-safe languages faces challenges such as limited ecosystem support, a shortage of skilled developers, and the time-intensive process of migration.

To address the issue now, Shane advocates for implementing Runtime Application Self Protection (RASP) in ICS environments. RASP can harden software binaries without rewriting code, actively defending systems from memory safety exploits while introducing minimal overhead.

Read the full article here

The post Memory safety vulnerabilities continue to plague ICS: Here’s what to do about it appeared first on RunSafe Security.

]]>
https://securitybrief.com.au/story/memory-safety-vulnerabilities-continue-to-plague-ics-here-s-what-to-do-about-it/feed/ 0
Perspectives on XSS Vulnerabilities with RunSafe’s CTO https://www.csoonline.com/article/3554821/whats-old-is-new-again-ai-is-bringing-xss-vulnerabilities-back-to-the-spotlight.html https://www.csoonline.com/article/3554821/whats-old-is-new-again-ai-is-bringing-xss-vulnerabilities-back-to-the-spotlight.html#respond Fri, 11 Oct 2024 18:44:04 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=252295 XSS vulnerabilities are a 30-year-old security flaw that won’t go away. Recently, CISA and the FBI sounded the alarm on cross-site scripting – but why now? And could AI make the problem even worse? Shane Fry, CTO at RunSafe Security, and industry experts weighed in on the issue in CSO Magazine. Read the article here. […]

The post Perspectives on XSS Vulnerabilities with RunSafe’s CTO appeared first on RunSafe Security.

]]>
XSS vulnerabilities are a 30-year-old security flaw that won’t go away. Recently, CISA and the FBI sounded the alarm on cross-site scripting – but why now? And could AI make the problem even worse?

Shane Fry, CTO at RunSafe Security, and industry experts weighed in on the issue in CSO Magazine. Read the article here.

Key Takeaways:

  • CISA and FBI have issued an alert urging tech manufacturers to address cross-site scripting (XSS) vulnerabilities, a persistent web security issue that has plagued the industry for nearly 30 years.
  • XSS vulnerabilities continue to be a problem due to human error, prioritization of functionality over security, coding complexity, and the use of older frameworks lacking built-in protections.
  • AI models trained on existing code repositories may inadvertently perpetuate and spread XSS vulnerabilities in newly generated code, potentially exacerbating the problem in future software development.

The post Perspectives on XSS Vulnerabilities with RunSafe’s CTO appeared first on RunSafe Security.

]]>
https://www.csoonline.com/article/3554821/whats-old-is-new-again-ai-is-bringing-xss-vulnerabilities-back-to-the-spotlight.html/feed/ 0
RunSafe CTO Discusses The Spacecraft Cybersecurity Act https://federalnewsnetwork.com/podcast/the-space-hour-podcast/legislation-now-calling-for-spacecraft-manufacturers-to-create-cybersecurity-plan-when-working-with-nasa/?utm_content=311397223&utm_medium=social&utm_source=linkedin&hss_channel=lcp-10176484 https://federalnewsnetwork.com/podcast/the-space-hour-podcast/legislation-now-calling-for-spacecraft-manufacturers-to-create-cybersecurity-plan-when-working-with-nasa/?utm_content=311397223&utm_medium=social&utm_source=linkedin&hss_channel=lcp-10176484#respond Fri, 11 Oct 2024 18:31:10 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=252293 Shane Fry, CTO at RunSafe Security, joined the Federal News Network on The Space Hour podcast to discuss The Spacecraft Cybersecurity Act and what spacecraft manufacturers can do to build cyber protections in during the manufacturing stage. “A lot of software running in space is in low-level languages,” Shane said. “We need solutions that can […]

The post RunSafe CTO Discusses The Spacecraft Cybersecurity Act appeared first on RunSafe Security.

]]>
Shane Fry, CTO at RunSafe Security, joined the Federal News Network on The Space Hour podcast to discuss The Spacecraft Cybersecurity Act and what spacecraft manufacturers can do to build cyber protections in during the manufacturing stage.

“A lot of software running in space is in low-level languages,” Shane said. “We need solutions that can help prevent against memory-corruption vulnerabilities where an adversary can use an external interface or a sensor or a wireless communications interface and takeover that space system. And that’s a scary thought.”

Listen to the conversation here.

Key Takeaways:

  • The Spacecraft Cybersecurity Act would require NASA to secure a cybersecurity protection plan from manufacturers applying to use federal dollars to build NASA spacecrafts.
  • Manufacturers need solutions to protect spacecraft systems that don’t add weight while still preventing against memory-corruption vulnerabilities and remote takeover.

The post RunSafe CTO Discusses The Spacecraft Cybersecurity Act appeared first on RunSafe Security.

]]>
https://federalnewsnetwork.com/podcast/the-space-hour-podcast/legislation-now-calling-for-spacecraft-manufacturers-to-create-cybersecurity-plan-when-working-with-nasa/?utm_content=311397223&utm_medium=social&utm_source=linkedin&hss_channel=lcp-10176484/feed/ 0
RunSafe CEO on Proposed Ban on Vehicle Software Originating within China or Russia https://securitytoday.com/Articles/2024/10/01/Biden-Administration-Proposes-Ban-on-Chinese-Vehicles-and-Russian-Tech.aspx https://securitytoday.com/Articles/2024/10/01/Biden-Administration-Proposes-Ban-on-Chinese-Vehicles-and-Russian-Tech.aspx#respond Wed, 02 Oct 2024 16:03:43 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=252131 The Biden Administration has proposed two rules that would ban new vehicle software originating within China or Russia as well as imports and sales of vehicles with automated driving hardware created in China or Russia. RunSafe Founder & CEO Joseph M. Saunders discusses the implications of the proposed bans in Security Today and how vehicle […]

The post RunSafe CEO on Proposed Ban on Vehicle Software Originating within China or Russia appeared first on RunSafe Security.

]]>
The Biden Administration has proposed two rules that would ban new vehicle software originating within China or Russia as well as imports and sales of vehicles with automated driving hardware created in China or Russia.

RunSafe Founder & CEO Joseph M. Saunders discusses the implications of the proposed bans in Security Today and how vehicle manufacturers can verify the integrity of their software supply chain.

Key Takeaways:

  • The Biden Administration is planning to restrict Chinese and Russian software/hardware in new cars sold in the US, citing national security concerns.
  • The bans would take effect in 2027 for software and 2030 for hardware.
  • U.S. vehicle manufacturers to know the pedigree of its software supply chain is to use Software Bills of Materials (SBOMs).

The post RunSafe CEO on Proposed Ban on Vehicle Software Originating within China or Russia appeared first on RunSafe Security.

]]>
https://securitytoday.com/Articles/2024/10/01/Biden-Administration-Proposes-Ban-on-Chinese-Vehicles-and-Russian-Tech.aspx/feed/ 0
RunSafe Expert Insights on China’s Salt Typhoon Attack https://industrialcyber.co/critical-infrastructure/china-linked-hackers-allegedly-target-us-internet-services-in-salt-typhoon-attack/ https://industrialcyber.co/critical-infrastructure/china-linked-hackers-allegedly-target-us-internet-services-in-salt-typhoon-attack/#respond Thu, 26 Sep 2024 18:11:26 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=251861 The recent Salt Typhoon attack highlights how China-linked hackers have breached U.S. broadband networks, exposing critical infrastructure and OT environments to significant risks. Doug Britton, CSO of RunSafe Security, explores the attack’s impact on OT networks, noting potential disruptions and device malfunctions. Joe Saunders, CEO, discusses the risks of hackers manipulating network routing and accessing […]

The post RunSafe Expert Insights on China’s Salt Typhoon Attack appeared first on RunSafe Security.

]]>
The recent Salt Typhoon attack highlights how China-linked hackers have breached U.S. broadband networks, exposing critical infrastructure and OT environments to significant risks.

Doug Britton, CSO of RunSafe Security, explores the attack’s impact on OT networks, noting potential disruptions and device malfunctions. Joe Saunders, CEO, discusses the risks of hackers manipulating network routing and accessing sensitive data, underscoring China’s deep infiltration into critical systems.

Key Takeaways:

  • Salt Typhoon exposes vulnerabilities in broadband and OT networks.
  • Urgent need to address network routing and firmware risks.
  • Enhancing security measures is crucial to countering advanced cyber threats.

Stay informed on how these attacks affect your infrastructure and the steps to bolster your defenses.

The post RunSafe Expert Insights on China’s Salt Typhoon Attack appeared first on RunSafe Security.

]]>
https://industrialcyber.co/critical-infrastructure/china-linked-hackers-allegedly-target-us-internet-services-in-salt-typhoon-attack/feed/ 0
RunSafe Security Secures $12M Series B to Boost Cyber Defense Capabilities https://technical.ly/civic-news/cybersecurity-runsafe-lockheed-dc-money-moves/ Tue, 24 Sep 2024 22:20:31 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=252914 RunSafe Security, based in McLean, has successfully raised $12 million in Series B funding to enhance its cybersecurity services for large enterprises and governmental bodies. The firm, which specializes in developing technology to thwart cyber attacks, will use the funds to bolster its sales and marketing efforts during a period of significant growth. This funding […]

The post RunSafe Security Secures $12M Series B to Boost Cyber Defense Capabilities appeared first on RunSafe Security.

]]>
RunSafe Security, based in McLean, has successfully raised $12 million in Series B funding to enhance its cybersecurity services for large enterprises and governmental bodies. The firm, which specializes in developing technology to thwart cyber attacks, will use the funds to bolster its sales and marketing efforts during a period of significant growth. This funding round was co-led by Critical Ventures and SineWave Venture Partners, with continued support from previous investors such as BMW i Ventures and Lockheed Martin Ventures. CEO Joe Saunders highlighted the strategic importance of these partnerships, especially with global companies like Lockheed Martin. RunSafe, operational since 2018 and holding 14 patents, serves clients ranging from the Army and Navy to private sector giants like GE Aviation and Schneider Electric.

The post RunSafe Security Secures $12M Series B to Boost Cyber Defense Capabilities appeared first on RunSafe Security.

]]>
House China hawks look to curb Transportation Department’s LiDAR purchases https://www.nextgov.com/cybersecurity/2024/09/house-china-hawks-look-curb-transportation-departments-lidar-purchases/399490/ https://www.nextgov.com/cybersecurity/2024/09/house-china-hawks-look-curb-transportation-departments-lidar-purchases/399490/#respond Mon, 23 Sep 2024 20:05:37 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=251310 The House China Select Committee is pushing legislation to ban the Department of Transportation from using LiDAR technology from foreign adversaries, like China, in order to protect U.S. infrastructure and national security. This bill aims to curb cybersecurity risks from companies such as Hesai. Joe Saunders, CEO of RunSafe Security, emphasized the importance of protecting […]

The post House China hawks look to curb Transportation Department’s LiDAR purchases appeared first on RunSafe Security.

]]>
The House China Select Committee is pushing legislation to ban the Department of Transportation from using LiDAR technology from foreign adversaries, like China, in order to protect U.S. infrastructure and national security. This bill aims to curb cybersecurity risks from companies such as Hesai. Joe Saunders, CEO of RunSafe Security, emphasized the importance of protecting this technology, stating, “We cannot cede our national security or technology competitiveness in this area.”

The post House China hawks look to curb Transportation Department’s LiDAR purchases appeared first on RunSafe Security.

]]>
https://www.nextgov.com/cybersecurity/2024/09/house-china-hawks-look-curb-transportation-departments-lidar-purchases/399490/feed/ 0
RunSafe Security on SBOMs and Supply Chain Security https://www.reversinglabs.com/blog/sbom-go-beyond-checkbox-software-security https://www.reversinglabs.com/blog/sbom-go-beyond-checkbox-software-security#respond Mon, 23 Sep 2024 19:57:29 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=251289 As organizations increasingly rely on SBOMs to enhance supply chain security, many fail to use them effectively. Shane Fry, Chief Technology Officer at RunSafe Security, highlighted that many companies treat SBOMs as a “checkbox exercise,” generating them without fully analyzing the risks within their software supply chains. He also pointed out that a large number […]

The post RunSafe Security on SBOMs and Supply Chain Security appeared first on RunSafe Security.

]]>
As organizations increasingly rely on SBOMs to enhance supply chain security, many fail to use them effectively.

Shane Fry, Chief Technology Officer at RunSafe Security, highlighted that many companies treat SBOMs as a “checkbox exercise,” generating them without fully analyzing the risks within their software supply chains. He also pointed out that a large number of organizations create SBOMs but refuse to share them with customers, preventing proper use to secure critical infrastructure.

Fry emphasized that SBOMs, when properly utilized, offer critical visibility into vulnerabilities and can significantly improve security. However, without comprehensive analysis and action, they lose their potential to mitigate supply chain risks.

The post RunSafe Security on SBOMs and Supply Chain Security appeared first on RunSafe Security.

]]>
https://www.reversinglabs.com/blog/sbom-go-beyond-checkbox-software-security/feed/ 0
RunSafe CEO Joe Saunders on Embedded Software Challenges https://www.manufacturing.net/cybersecurity/video/22920808/security-breach-getting-past-the-whackamole-approach https://www.manufacturing.net/cybersecurity/video/22920808/security-breach-getting-past-the-whackamole-approach#respond Fri, 20 Sep 2024 17:29:33 +0000 https://runsafesecurity.com/?post_type=in_the_news&p=6915 In this episode, Joe Saunders, CEO of RunSafe Security, discusses the evolving challenges in securing embedded software and connected devices. He explains the need to move beyond the “whack-a-mole” approach by addressing memory-based vulnerabilities at a class level. Saunders also touches on securing legacy OT systems with minimal disruption, adopting CISA’s secure-by-demand guidelines, and managing […]

The post RunSafe CEO Joe Saunders on Embedded Software Challenges appeared first on RunSafe Security.

]]>
In this episode, Joe Saunders, CEO of RunSafe Security, discusses the evolving challenges in securing embedded software and connected devices. He explains the need to move beyond the “whack-a-mole” approach by addressing memory-based vulnerabilities at a class level. Saunders also touches on securing legacy OT systems with minimal disruption, adopting CISA’s secure-by-demand guidelines, and managing the balance between increased connectivity and maintaining security. He further warns of the growing risks from state-sponsored actors like China.

The post RunSafe CEO Joe Saunders on Embedded Software Challenges appeared first on RunSafe Security.

]]>
https://www.manufacturing.net/cybersecurity/video/22920808/security-breach-getting-past-the-whackamole-approach/feed/ 0