CIO Influence
CIO Influence News Security

RunSafe Security Launches Powerful New Risk Reduction Analysis to Reveal Software Exposure to CVEs and Memory-Based Zero Days

RunSafe Security Launches Powerful New Risk Reduction Analysis to Reveal Software Exposure to CVEs and Memory-Based Zero Days

RunSafeSecurity logo

RunSafe Risk Reduction Analysis identifies known and unknown risk in embedded systems and quantifies total risk reduction with runtime protections applied

RunSafe Security, a pioneer of cyberhardening technology for embedded systems across critical infrastructure, announced the launch of its newest innovation, theย RunSafe Risk Reduction Analysis, which analyzes total exposure to Common Vulnerabilities and Exposures (CVEs) and memory-based zero days in software. Designed for cybersecurity professionals and embedded systems developers, the solution provides much-needed insight into system vulnerabilities as well as data on how runtime mitigations can drastically reduce software exposure.

Latest CIO Influence News:ย VulnCheck and Filigran Partner to Transform Enterprise Threat Intelligence Capabilities

Critically, the RunSafe Risk Reduction Analysis, part of the company’sย Identifyย solution, focuses on identification and mitigation of memory-based vulnerabilities, which are one of the most exploited classes of security flaws in modern embedded systems. Memory safety flaws leave software susceptible to attacks such as arbitrary code execution, privilege escalation, denial-of-service (DoS), and data theft. The Risk Reduction Analysis reveals total exposure to these critical flaws while measuring the risk reduction achieved when applying advanced runtime protections.

“Memory safety issues continue to account for nearly 70% of vulnerabilities in embedded systems,” saidย Joseph M. Saunders, Founder and CEO of RunSafe Security. “With the Risk Reduction Analysis, we’re giving organizations the tools and insights to eliminate an entire class of vulnerabilities, significantly improving their resilience against remote code execution attacks and other exploits.”

Read the CIO Influence Interview:ย CIO Influence Interview with Dan Bradbury, Head of Product, UpGuard

The Risk Reduction Analysis works by analyzing a software binary or an SBOM to calculate the risk to embedded systems. The tool’s ability to quantify memory-based zero days is developed out of novel research from Linkรถping University and calculates the number of binary attack vectors, or return-oriented programming (ROP) chains, within software. In an example analysis, the tool revealed that software was exposed to 1.6 million potential ROP gadgets, but with runtime protections applied, there was a risk reduction of >98.28%.

[To share your insights with us as part of editorial or sponsored content, please write toย psen@itechseries.com]

Related posts

Samsung Demonstrates the World’s First MRAM Based In-memory Computing

CIO Influence News Desk

Zapier Announces National No-Code Day and Launches No-Code Innovation Contest

CIO Influence News Desk

AMD Strengthens Sony’s LiDAR Auto Solution with Adaptive Computing Technology

CIO Influence Staff Writer