Protect Critical Infrastructure With Runsafe Security’s Alkemist
· Cybersecurity

Protect Critical Infrastructure With Runsafe Security’s Alkemist

Hackers are having increasing success penetrating the operating technology and industrial control systems underpinning data centers, utilities, manufacturing plants. As organizations incorporate smart devices, connect to the Internet of Things, and utilize the cloud to optimize performance, new attack vectors – and cyber vulnerabilities – are created. Skilled cybercriminals only need to find a single […]

Read more →
Cybersecurity Trends to Prepare for in 2022
· Cybersecurity

Cybersecurity Trends to Prepare for in 2022

Recap of Cybersecurity and Cyber Attacks in 2021 Dare I say that the past year has been…drumroll…unprecedented…in the realm of cybersecurity and cyber attacks?  Here are some statistics to showcase what the industry has endured over the past 12 months: With the trends over the previous year, ransomware costs are expected to reach $265 Billion […]

Read more →
Addressing cybersecurity vulnerabilities in the changing LINUX landscape
· Cybersecurity

Addressing cybersecurity vulnerabilities in the changing LINUX landscape

Linux is a prevalent component of nearly every workload: more than 90% of cloud workloads and 70% of web servers run on it. Like all technology solutions, Linux has continued to evolve over time, potentially opening you up to new cyber security threats. Bad actors often have an advantage because they are working against known security measures […]

Read more →
Using Security Monitoring to Address Cybersecurity Threats
· ICS Security

Using Security Monitoring to Address Cybersecurity Threats

Joe Saunders, CEO of RunSafe Security, recently hosted a panel discussion on Monitoring Open Source Software in SAAS Infrastructure. His panel included business leaders in the software, technology, and security sectors: Jonathan B Fishbeck, Founder and CEO of EstateSpace, LLC, a Managed Security Services Provider (MSSP) that helps people reduce risk, retain property assets, and protect […]

Read more →
Cybersecurity Tactics to Prevent Jackware Attacks on Embedded Devices
· ICS Security

Cybersecurity Tactics to Prevent Jackware Attacks on Embedded Devices

Ransomware is a serious cybersecurity challenge that is growing at uncontrollable rates. Every 11 seconds, a new organization falls victim to a ransomware attack. And by the end of this year, the cost of ransomware to businesses is expected to surpass $20 billion. In this article we present some cybersecurity tactics to prevent jackware attacks […]

Read more →
Three Ways to Help Improve the Nation’s Cybersecurity
· ICS Security

Three Ways to Help Improve the Nation’s Cybersecurity

By now, you’ve heard about Executive Order 14028 on “Improving the Nation’s Cybersecurity” which President Biden signed in May, 2021. It begins by stating, “The United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy.  The Federal Government must improve […]

Read more →
Industry Feedback from Executive Order on Improving the Nation’s Cybersecurity
· ICS Security

Industry Feedback from Executive Order on Improving the Nation’s Cybersecurity

The recent signing of the Executive Order on Improving the Nation’s Cybersecurity has spurred much discussion among the industry.  IIoT World asked for input from leading cybersecurity experts and organizations regarding the EO, and we’re sharing the discussion with our community. Here are some excerpts from our exchanges on LinkedIn:   “Having the EO emphasize […]

Read more →
Cybersecurity to Improve Profitability
· ICS Security

Cybersecurity to Improve Profitability

Cybersecurity has financial benefits, offers product differentiation, and smooths out the patching processes both for product manufacturers and their customers. The importance of cyber defense will go up over time. Cyber defense and security for embedded systems is justified using a total cost of ownership approach, as quantifying economic benefits will help justify faster adoption. […]

Read more →
Cybersecurity Gaps in Scanning and Patching Vulnerabilities in Software
· Cybersecurity

Cybersecurity Gaps in Scanning and Patching Vulnerabilities in Software

Current strategies of scanning for and patching vulnerabilities in software leave a huge and highly-exploitable security gap. Recent research by RunSafe Security partners show that current strategies of scanning for and patching vulnerabilities in software leave a huge and highly-exploitable security gap. When measured against NIST CVEs (Common Vulnerability Enumerations from the National Vulnerability Database), […]

Read more →
Cybersecurity for Embedded Systems
· ICS Security

Cybersecurity for Embedded Systems

All critical infrastructure is under cyber attack, all the time. The attack on the Oldsmar, FL water supply is a good example. And it’s getting worse; vulnerability to cyber attack is increasing as the embedded devices controlling these critical infrastructures become more connected. The DevOps approach to software development offers an antidote—an opportunity to embed run-time […]

Read more →
Cybersecurity for Shared Cloud Environments
· Cybersecurity

Cybersecurity for Shared Cloud Environments

In its recent Cloud Workload Protection Platform (CWPP) research note, Gartner identified memory exploit protection as an essential component of any organization’s CWP strategy (Gartner, Cloud Workload Protection Platforms, 2020):  “Exploit Prevention/Memory Protection–application control solutions are fallible and must be combined with exploit prevention and memory protection capabilities…”—Gartner CWPP 2020 Cybersecurity Considerations for the Cloud Cloud deployments […]

Read more →