The Common Vulnerability That Fintech and Bananas Share
· Cybersecurity

The Common Vulnerability That Fintech and Bananas Share

Fintech is defined by technologies that span the cloud, mobile devices, blockchain, and AI for financial applications ranging from virtual currencies, to payment processing, money transfers, equity trading, and regulatory compliance, among others. There has been spectacular scaling in the sector of late, and today there are no less than 27 billion-dollar valued Fintech companies. Unfortunately, […]

Read more →
All Endpoints Are Not Created Equal, But They All Need Protection
· Cybersecurity

All Endpoints Are Not Created Equal, But They All Need Protection

What you are about to read could be straight out of a horror movie. You would hear the eerie voiceover intoning…”In a world where endpoints are under constant attack, how do you protect yourself? Your critical infrastructure? Your data? Your business?” It’s a weighty question and a huge topic that probably does warrant an entire […]

Read more →
The CANOPY WING Vulnerability: Weaponizing the Weakness
· Cybersecurity

The CANOPY WING Vulnerability: Weaponizing the Weakness

Finding a vulnerability, developing an exploit, and then launching (or not launching) this exploit – is repeated many times every day. Now more than ever companies must be aware of two perspectives: what a system is intended to do, and what a system can do. The term Cyber-Newtonian Wormhole captures this duality. What is The […]

Read more →
Are We Doomed to Repeat the Past When it Come to Hacking?
· Cybersecurity

Are We Doomed to Repeat the Past When it Come to Hacking?

On an almost weekly basis, another organization or government agency owns up to having been “hacked” – admitting that its systems have been breached. For every company that discloses an issue, there are likely 20 – 30 more that keep it under wraps. We know this because more than half of all U.S. businesses have been hacked. […]

Read more →
Commercial Availability of Self-Service Cyberhardening Technology
· Cybersecurity

Commercial Availability of Self-Service Cyberhardening Technology

RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems, devices and industrial control systems (ICS), has announced the commercial availability of Alkemist, a proprietary self-service technology built to reduce vulnerabilities and deny malware the uniformity needed to execute. Previously known as Software Guardian, Alkemist uses remotely deployable software binary runtime application self-protection […]

Read more →
Simon Hartley, Strategic Accounts
· Our Contributors

Simon Hartley, Strategic Accounts

Mr. Hartley works with government customers at CIS Mobile with its altOS mobile security platform.  He also worked with Apple and Samsung in hardening their mobile devices for U.S. government use and is a frequent speaker on cybersecurity at industry events. Previously, he was Vice President and Co-Founder of the startup RunSafe Security, Vice President […]

Read more →
Binary randomization makes large-scale vulnerability exploitation nearly impossible
· Cybersecurity

Binary randomization makes large-scale vulnerability exploitation nearly impossible

One of the main reasons cyber risk continues to increase exponentially is due to the rapid expansion of attack surfaces – the places where software programs are vulnerable to attack or probe by an adversary. Attack surfaces, according to the SANS Institute, can include any part of a company’s infrastructure that exposes its networks and systems […]

Read more →
The Antidote to Industrial IoT’s Kryptonite
· Cybersecurity

The Antidote to Industrial IoT’s Kryptonite

Today’s industrial infrastructure is stronger and smarter than ever before. As manufacturers seek greater scalability and efficiency, they’ve automated and digitized their machines to achieve unprecedented power. But these “super” machines have a critical weakness – they were not built to shield against today’s advanced cyberattacks. One single attack – industrial IoT ’s kryptonite – […]

Read more →
Joe Saunders, Founder and CEO
· Our Contributors

Joe Saunders, Founder and CEO

Joe Saunders has more than 25 years of leadership, business building, and startup experience having served in a variety of business development and general management roles for high growth companies. Prior to founding RunSafe Security, Joe served as director of Thomson Reuters Special Services, where he led analytical solutions to help law enforcement agencies identify […]

Read more →