Runsafe Security

See the following -

How Cyber Hardening Can Protect Patient Privacy And Treatment

The abundance of internet-connected devices that collect and share patient data has greatly increased the “attack surface” (where an attacker inserts or extracts data) and number of possible vulnerabilities within a system. Now that medical devices can connect to home-based routers, public Wi-Fi or cellular networks to relay data to hospitals, specialists, and care providers. In addition, the software in those devices lacks cybersecurity and can be updated and reprogrammed remotely. Thus, sensitive patient information is even more prone to data breaches, and the safety of the devices can be compromised. Recent supply chain compromises, and the migration of health applications and platforms to the cloud, also add to the threat equation. This article looks at why the medical community is so vulnerable and suggests how it can better protect life-saving equipment and sensitive data from unprecedented cyberattacks.

Read More »

Lisa Silverman

Following in the footsteps of one of Germanic mythologies’ most transformational heroines is Vice President of Marketing of RunSafe Security Lisa Silverman (Silver-Brunnhild), who valiantly serves as defender of the company’s value proposition, executioner of lead generation and overall slayer of the Read More »

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices. With the ability to make each device functionally identical but logically unique, RunSafe Security renders threats inert by eliminating attack vectors, significantly reducing vulnerabilities and denying malware the uniformity required to propagate.

Read More »

Simon Hartley

Simon Hartley is leading the US introduction of the altOS mobile security platform with a startup company, CIS Mobile (https://cismobile.com), working with early adopters in the Intelligence, Department of Defense (DoD), and Federal Civilian communities.  He previously worked with Apple and Samsung in hardening their platforms to meet the needs of the U.S. Government marketplace. He is an advisor and investor in a number of cybersecurity startups in the Washington, DC area.

Read More »

Who Controls Your Smartphone? And How to Leverage Open Source to Prevent it from Spying on You

There are many things about today’s world that warrant us asking that question. Do you or the mobile vendor control your smartphones? If you are a consumer, small or medium business (SMB) -- the answer is the vendor...What if you are a large enterprise or a government agency? The answer is still the vendor...How can the user regain control? Not all vendors have locked devices and walled gardens. Google’s line of Pixel hardware, for example, is a mid-market solution whose bootloader allows locking and re-locking. Pixels support two versions of Android. Google Mobile Services (GMS), where free services are tied to data monetization and a UX like Apple and Samsung devices. Secondly, Pixels can run Android Open-Source Project (AOSP) code that shares the same strengths as the GMS build, but the customer controls the code base and updates. There are several companies that are selling AOSP operating system builds for Pixel and other unlockable/lockable mobile phones and tablets...

Read More »

Cyber Resilience: Protecting Data and Immunizing Software

Event Details
Type: 
Seminar/Webinar
Date: 
April 21, 2020 - 2:00pm - 3:00pm

Two of the most innovative and impactful cyber security technologies will be featured in a one hour webinar. Cyber Reliant uses a unique shredding technology to protect data at rest, in transit, and in use. RunSafe Security transforms (or "stirs") existing software binaries on devices and in embedded systems to cyber harden them against memory corruption, supply chain, and zero-day attacks. Both of these technologies function under the assumption of breach. Don't miss this opportunity to hear about these two game-changing cyber technologies and ask the presenters your questions.

Read More »

Bad Actors Find Ways In - Webinar with RunSafe and Cyber Reliant

Event Details
Type: 
Seminar/Webinar
Date: 
July 1, 2020 - 11:00am - 12:00pm

Next Wednesday (July 1 at 1100 EST) two cyber technology companies that may will be discussing how their technologies can protect data, software, and hardware, even when a network is breached, the supply chain is compromised, and nefarious insiders have access. The two companies are Cyber Reliant and RunSafe Security.

Read More »