<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">
<!--

      ******************************************************************
      *     This is an RSS feed. It's what makes your podcast work.    *
      *    You can submit it to directories to get your show listed.   *
      *              For guides on how to do this, visit               *
      * https://help.podcast.co/submitting-your-podcast-to-directories *
      ******************************************************************

-->
  <channel>
    <itunes:type>episodic</itunes:type>
<description><![CDATA[<p><b>Exploited: The Cyber Truth</b> is a hard-hitting, no-fluff podcast exposing the realities of today’s cyber threat landscape and risks to critical infrastructure. Through candid conversations with top cybersecurity experts, industry leaders, and frontline defenders, the show breaks down recent high-profile vulnerabilities and exploits and covers innovative strategies used to stop them. To keep critical infrastructure safe, defenders need the upper hand. Tune in and get the cyber truth.</p>]]></description>
<itunes:subtitle></itunes:subtitle>
<title>Exploited: The Cyber Truth </title>

<copyright>2025 Exploited: The Cyber Truth</copyright>
<itunes:author>RunSafe Security</itunes:author>
<itunes:category text="Education">
  </itunes:category>
<itunes:category text="Technology">
  </itunes:category>
<itunes:category text="News">
    <itunes:category text="Tech News" />
  </itunes:category>
<itunes:category text="Business">
  </itunes:category>
<itunes:explicit>false</itunes:explicit>
<itunes:image href="https://images.pod.co/dktJZEpOie85jU5m3eb12EbWcok7PDX2lO7gg6VYe7c/resize:fill:1500:1500/plain/artwork/79ed219f-372c-4430-afe8-6cd217dbd90e/exploited-the-cyber-truth-1744038131.jpg" />
<itunes:owner>
  <itunes:name>RunSafe Security</itunes:name>
  <itunes:email>Staci@RunSafeSecurity.com</itunes:email>
</itunes:owner>
<language>en</language>
<link>https://runsafesecurity.com/</link>

<link rel="hub" href="https://pubsubhubbub.appspot.com/"/>

        
<item>
  <description>
    <![CDATA[<p>Embedded systems power everything from critical infrastructure to defense systems, yet vulnerabilities in those systems often go unseen and unaddressed. In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and special guests Mario Zuniga and Matt Janson of MITRE to discuss the “invisible attack surface” lurking within embedded and cyber-physical systems.</p>

<p>Drawing on their frontline experience in cyber operations and resiliency engineering, Mario and Matt explain why embedded systems demand a fundamentally different approach to cybersecurity. From limited patching capabilities and long system lifecycles to unique hardware and firmware attack vectors, traditional IT security models fall short in these environments.</p>

<p>Together, they discuss:</p>

<ul><li>Why embedded systems are often overlooked in cybersecurity strategies</li><li>How attackers exploit firmware, hardware interfaces, and air-gapped environments</li><li>The challenges of securing systems that must remain operational for decades</li><li>The role of MITRE’s embedded threat matrix (ESTEEM) in mapping adversary behavior</li><li>Why resilience—not just prevention—is key to defending critical infrastructure</li></ul>

<p>From industrial control systems to national defense, this episode reveals what it takes to secure the technologies that quietly underpin modern society and why the time to act is now.</p>]]>
  </description>
  <itunes:title>The Invisible Attack Surface: Cybersecurity for Embedded Systems</itunes:title>
  <title>The Invisible Attack Surface: Cybersecurity for Embedded Systems</title>

    <enclosure length="32028086" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/c35b72fa-f295-4e5b-8dad-0c715cc86dc2.mp3" />
  <itunes:duration>00:33:21</itunes:duration>
    <guid isPermaLink="false">c35b72fa-f295-4e5b-8dad-0c715cc86dc2</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>3</itunes:episode>
      <itunes:season>2</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/4nMzbtd1qX1Rqh24zCYveTVEGgxnnWFg9jUxhyctxxM/resize:fill:1500:1500/plain/artwork/d4612ca2-1acc-4b8f-872d-604829424a8e/exploited-the-cyber-truth/the-invisible-attack-surface-cybersecurity-for-embedded-systems-1776348608.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 16 Apr 2026 14:10:07 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Artificial intelligence is transforming cybersecurity but not in the way many expect. While defenders are using AI to accelerate detection, triage, and threat hunting, adversaries are leveraging the same tools to scale reconnaissance, automate exploit development, and dramatically increase the speed of attack.</p>

<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and Joe Slowik, Director of Cybersecurity Alerting Strategy at Dataminr, to discuss one critical question: Does AI actually reduce vulnerability risk or just accelerate the conflict?</p>

<p>With a background including MITRE ATT&amp;CK, Dragos, Los Alamos National Laboratory, and U.S. government offensive operations, Slowik offers a dual-lens perspective on how AI is reshaping both sides of cybersecurity.</p>

<p>Together, they explore:</p>

<ul><li>How AI is increasing the <b>velocity of vulnerability discovery and exploitation</b></li><li>Why attackers may benefit from <b>“good enough” AI outputs</b>, while defenders require precision</li><li>The rise in CVEs and why more vulnerabilities doesn’t necessarily mean worse security</li><li>The growing risk in <b>OT, IoT, and unmanaged edge devices</b></li><li>Why AI is a <b>powerful tool—not a magic bullet</b>—and what that means for defenders</li></ul>

<p>From enterprise security teams to critical infrastructure operators, this episode breaks down what security leaders must understand to stay ahead in an AI-accelerated threat landscape.</p>]]>
  </description>
  <itunes:title>AI vs. Vulnerabilities: Who Really Wins?</itunes:title>
  <title>AI vs. Vulnerabilities: Who Really Wins?</title>

    <enclosure length="32581443" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/f0077f16-ec1f-446e-a2fb-2c63ceb4dd88.mp3" />
  <itunes:duration>00:33:56</itunes:duration>
    <guid isPermaLink="false">f0077f16-ec1f-446e-a2fb-2c63ceb4dd88</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>2</itunes:episode>
      <itunes:season>2</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/UXqIcO6S-mYbNXWf9kdYOnE1oWzmX3xdo08ct7tBd9I/resize:fill:1500:1500/plain/artwork/7957c99f-1d29-4798-954a-3ff77877a414/exploited-the-cyber-truth/ai-vs-vulnerabilities-who-really-wins-1774525136.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 26 Mar 2026 11:38:55 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth,</i> host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and embedded systems expert Jacob Beningo to explore how AI is changing the software development lifecycle for embedded and firmware teams.</p>

<p>Together, they unpack the risks and responsibilities that come with AI-generated code. While AI can accelerate development and automate tedious tasks, it can also introduce defects, expand the attack surface, and create a dangerous illusion of completeness. Unlike human engineers, AI cannot explain intent, reason about long-term system behavior, or take accountability when systems fail.</p>

<p>Joe and Jacob discuss how engineering teams can safely integrate AI into development workflows without sacrificing security, reliability, or accountability, especially in systems that must operate safely for years in the field.</p>

<p>In this episode, they explore:</p>

<ul><li>Why AI-generated code can introduce hidden vulnerabilities and complexity</li><li>The accountability challenge: who owns the risk when AI writes the code?</li><li>How AI output should be treated as untrusted code by default</li><li>Why rigorous testing, validation, and security reviews still matter</li><li>Practical ways engineering teams can use AI responsibly in embedded development</li></ul>

<p>For engineers, security leaders, and product teams navigating AI adoption in embedded systems, this episode offers practical insights into how to move faster with AI without weakening trust in the systems you build.</p>]]>
  </description>
  <itunes:title>AI Wrote the Code—Who Owns the Risk? </itunes:title>
  <title>AI Wrote the Code—Who Owns the Risk? </title>

    <enclosure length="30311504" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/44c4bab7-0255-458b-90e2-38e03ba12cfe.mp3" />
  <itunes:duration>00:31:34</itunes:duration>
    <guid isPermaLink="false">44c4bab7-0255-458b-90e2-38e03ba12cfe</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>1</itunes:episode>
      <itunes:season>2</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/riBWmeiTylr4mC_c8SK6WsoDICI4T1YoeRhvKD31LXE/resize:fill:1500:1500/plain/artwork/1705c51a-24ba-4a7a-b467-c82f103ac325/exploited-the-cyber-truth/ai-wrote-the-codewho-owns-the-risk-1773316979.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 12 Mar 2026 12:02:58 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and Cordell Robinson, CEO of Brownstone Consulting, to explore how security frameworks like NIST 800-53 are evolving from paperwork exercises into real drivers of security maturity.</p>

<p>From continuous monitoring and secure-by-design development to Software Bills of Materials (SBOMs) and vulnerability transparency, the conversation examines what it takes to build trust in embedded and operational technology (OT) systems, especially as regulators sharpen their focus and nation-state threats grow more sophisticated.</p>

<p>Together, they explore:</p>

<ul><li>Why compliance should cover people, processes, and technology—not just policies</li><li>How NIST frameworks are shifting from checklists to operational rigor</li><li>The growing importance of SBOMs in supply chain transparency</li><li>How AI is reshaping both cyber defense and attacker capability</li><li>What new regulatory pressure (including the EU Cyber Resilience Act) means for manufacturers</li></ul>

<p>Whether you build embedded systems, ship software to government agencies, or manage critical infrastructure, this episode offers practical insight into building compliance programs that strengthen security and earn trust.</p>]]>
  </description>
  <itunes:title>From NIST to Nation-State: Securing Embedded Systems through Compliance and Trust</itunes:title>
  <title>From NIST to Nation-State: Securing Embedded Systems through Compliance and Trust</title>

    <enclosure length="31599696" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/9a671dc7-030f-41b0-b3e6-413145ea2f0c.mp3" />
  <itunes:duration>00:32:54</itunes:duration>
    <guid isPermaLink="false">9a671dc7-030f-41b0-b3e6-413145ea2f0c</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>40</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/sPlW6b_Oh8bWPwBMzfnm0UiMiL5FmCcA7-Atg1Uw_ro/resize:fill:1500:1500/plain/artwork/12af81c5-6a04-4fe7-9235-489685b03a9d/exploited-the-cyber-truth/from-nist-to-nation-state-securing-embedded-systems-through-compliance-and-trust-1772109506.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 26 Feb 2026 12:38:25 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <b>Exploited: The Cyber Truth</b>, host Paul Ducklin is joined by RunSafe Security CEO Joseph M. Saunders and OT/ICS security expert Mike Holcomb, founder of UTILSEC, for a candid discussion about the weaknesses attackers exploit inside industrial environments.</p>

<p>Mike shares what he repeatedly finds during assessments of large OT and ICS networks: no effective firewall between IT and OT, flat networks with little segmentation, stale Windows domains, shared engineering credentials, exposed HMIs, and OT protocols that will accept commands from any reachable host. He explains how attackers move from IT into OT using familiar enterprise techniques before pivoting into PLCs, RTUs, safety systems, and historians.</p>

<p>Joe outlines why secure-by-design practices, higher software quality, and “secure by demand” procurement are critical to long-term resilience—especially as cloud connectivity and AI accelerate modernization in industrial environments.</p>

<p>Together, they explore:</p>

<ul><li>Why a missing or misconfigured IT/OT firewall remains the most common and dangerous gap</li><li>How micro-segmentation and unidirectional architectures reduce blast radius</li><li>The risks of web-enabled HMIs and long-lived legacy systems</li><li>Why monitoring PLC programming traffic and historian queries matters</li><li>How the Cyber Resilience Act is reshaping accountability for OT vendors</li></ul>

<p>If you’re responsible for industrial operations, plant uptime, or product security, this episode shows how attackers actually move through OT environments—and how to eliminate the mistakes they depend on.</p>]]>
  </description>
  <itunes:title>The OT Mistakes Attackers Count On—And How to Fix Them Before They Do</itunes:title>
  <title>The OT Mistakes Attackers Count On—And How to Fix Them Before They Do</title>

    <enclosure length="30024388" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/576c2891-644c-4af4-a5fd-281b45d72f3a.mp3" />
  <itunes:duration>00:31:16</itunes:duration>
    <guid isPermaLink="false">576c2891-644c-4af4-a5fd-281b45d72f3a</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>39</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/JyYYKax8Fuqkyl5qRpxPB3nJdh_fsgS9I_Yw4mbA-FU/resize:fill:1500:1500/plain/artwork/4e70611b-7225-4709-b1c3-660afdb7b9f8/exploited-the-cyber-truth/the-ot-mistakes-attackers-count-onand-how-to-fix-them-before-they-do-1770900535.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 12 Feb 2026 12:48:54 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <b>Exploited: The Cyber Truth</b>, host Paul Ducklin is joined by RunSafe Security Founder and CEO <b>Joseph M. Saunders</b> and embedded systems expert <b>Elecia White</b>, host of <i>Embedded.fm</i> and author of <i>Making Embedded Systems</i>, to discuss the trade-offs of using open source in embedded development.</p>

<p>The conversation goes beyond debates about “open vs. proprietary” to explore how a single library can quietly introduce sprawling dependency chains, unclear maintenance responsibilities, licensing obligations, and long-term security exposure,  especially in devices expected to operate for years or decades.</p>

<p>Elecia and Joe share guidance for using open source intentionally, including how to set guardrails early, limit dependency blast radius, and design systems that can respond when vulnerabilities emerge, even when patching isn’t easy.</p>

<p>Together, they cover:</p>

<ul><li>Why embedded teams don’t get burned by open source, they get burned by unexamined dependencies</li><li>How transitive dependencies and “helpful” packages quietly expand attack surface</li><li>Why professionalism, documentation, and disclosure practices signal trustworthy projects</li><li>Why build-time SBOMs matter more than after-the-fact analysis</li><li>How Secure by Design thinking reduces reliance on emergency patching</li></ul>

<p>For embedded engineers, product leaders, and security teams balancing delivery pressure with long-lived risk, this episode offers advice for using open source without inheriting future incidents.</p>]]>
  </description>
  <itunes:title>Balancing Speed and Security: The Open Source Dilemma in Embedded Development</itunes:title>
  <title>Balancing Speed and Security: The Open Source Dilemma in Embedded Development</title>

    <enclosure length="28325399" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/c52d3ca6-11da-4bf2-b786-0c6db6945794.mp3" />
  <itunes:duration>00:29:30</itunes:duration>
    <guid isPermaLink="false">c52d3ca6-11da-4bf2-b786-0c6db6945794</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>38</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/XNLWAxvqctpUyuA-QwC5rQx88_hhMGyqcXoylf7IWNA/resize:fill:1500:1500/plain/artwork/a54192c2-68e8-4617-a936-fd13f10fb47a/exploited-the-cyber-truth/balancing-speed-and-security-the-open-source-dilemma-in-embedded-development-1769689733.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 29 Jan 2026 12:28:38 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Autonomous and connected vehicles are reshaping transportation, but increased software complexity and connectivity introduce serious security and safety challenges that can’t be solved with traditional perimeter defenses.</p>

<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and Hemanth Tadepalli, Senior Cybersecurity &amp; Compliance SME at May Mobility, for a practical discussion on what cyber resilience looks like inside real-world autonomous vehicle programs.</p>

<p>Hemanth draws on his experience securing mobility systems at May Mobility, as well as prior work with Mandiant, Google, and AlixPartners, to explain how automotive organizations are adapting to software-defined vehicle architectures, regulatory pressure, and expanding attack surfaces. Joe shares his perspective on why mobility companies increasingly resemble software companies and what that means for engineering, governance, and operational security.</p>

<p>Together, they explore:</p>

<ul><li>How connected and autonomous vehicle architectures expand the attack surface</li><li>What cyber resilience means in day-to-day engineering and fleet operations</li><li>How governance, threat intelligence, and software validation reduce risk</li><li>Regulatory pressures shaping automotive security decisions</li><li>How teams balance detection, response, and safety in autonomous systems</li></ul>

<p>Whether you’re building autonomous platforms, managing connected fleets, or securing safety-critical software, this episode offers a grounded look at what it takes to keep modern mobility systems trustworthy and safe.</p>]]>
  </description>
  <itunes:title>Beyond Defense: Building Cyber Resilience in Autonomous and Connected Mobility</itunes:title>
  <title>Beyond Defense: Building Cyber Resilience in Autonomous and Connected Mobility</title>

    <enclosure length="24405765" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/b21da96c-a1b0-403f-a0e3-f896dc8eb86f.mp3" />
  <itunes:duration>00:25:25</itunes:duration>
    <guid isPermaLink="false">b21da96c-a1b0-403f-a0e3-f896dc8eb86f</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>37</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/x6Ms70J_t5hQWq5-o4HCc_AA-3u-3mkuXMkGx4bvMUg/resize:fill:1500:1500/plain/artwork/0dee4007-5a49-408c-86ec-2360af1ceb7e/exploited-the-cyber-truth/beyond-defense-building-cyber-resilience-in-autonomous-and-connected-mobility-1768484042.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 15 Jan 2026 13:34:00 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>As industrial control systems become more connected, more Linux-based, and more exposed to IT-style threats, 2026 is shaping up to be a turning point for ICS security.</p>

<p>In this end-of-year predictions episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security Founder &amp; CEO Joseph M. Saunders and CTO Shane Fry to discuss what will define ICS and critical infrastructure security in 2026.</p>

<p>The episode explores a bold prediction: We will see a major ICS breach originating from a web application vulnerability running directly on an embedded control device. As full Linux operating systems, Node.js apps, and web servers increasingly appear inside OT equipment, long-standing IT vulnerabilities are colliding with systems that are difficult—or impossible—to patch.</p>

<p>Joe and Shane dig into why detection-only strategies fall short in constrained, long-lived devices, and why secure by design engineering, memory safety, and runtime protections are becoming essential. They also discuss the importance of accurate, build-time Software Bills of Materials, especially as regulations like the EU Cyber Resilience Act push manufacturers toward transparency, accountability, and provable supply-chain visibility.</p>

<p>Together, they cover:</p>

<ul><li>Why ICS exploitation is shifting from theoretical to operational</li><li>How web app and RCE vulnerabilities are creeping into OT devices</li><li>The limits of detection-only security strategies</li><li>Why memory safety and runtime protections reduce exploitable risk</li><li>How build-time SBOMs improve vulnerability tracking and trust</li></ul>]]>
  </description>
  <itunes:title>2026 ICS Security Predictions: What’s Next for Critical Infrastructure</itunes:title>
  <title>2026 ICS Security Predictions: What’s Next for Critical Infrastructure</title>

    <enclosure length="30431895" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/6c1a5362-2dd1-4b21-8aaf-6c8ad0f3a804.mp3" />
  <itunes:duration>00:31:41</itunes:duration>
    <guid isPermaLink="false">6c1a5362-2dd1-4b21-8aaf-6c8ad0f3a804</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>36</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/LeEqTW4UFt2iPBSozygiVWuhGG3vv_PaeBvkNpOgp_A/resize:fill:1500:1500/plain/artwork/778fa42b-7ca6-4a8e-8c9a-627b91b917f8/exploited-the-cyber-truth/2026-ics-security-predictions-whats-next-for-critical-infrastructure-1767106049.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Tue, 30 Dec 2025 14:47:28 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>As vehicles evolve into always-connected, software-defined systems, cybersecurity decisions increasingly shape privacy, safety, and trust on the road.</p>

<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security CEO Joseph M. Saunders and special guest Sean McKeever, Global Product Cybersecurity Lead at Marelli, for a candid discussion on what it really means to secure modern vehicles. Sean brings deep industry experience to unpack how OEMs and suppliers are navigating data stewardship, autonomous testing, vehicle theft, and diverging global regulations.</p>

<p>Together, Paul, Joe, and Sean explore:</p>

<ul><li>What constant connectivity means for driver privacy and data stewardship</li><li>The risks of beta-testing autonomous systems on public roads</li><li>How car theft has shifted from physical break-ins to software exploitation</li><li>Why U.S. and EU cybersecurity regulations take fundamentally different approaches</li><li>The importance of collaboration across OEMs, suppliers, and regulators</li></ul>

<p>From RF relay attacks to software-defined vehicles with decade-long lifecycles, this episode highlights why cybersecurity is no longer an add-on but a core design decision shaping the future of mobility.</p>]]>
  </description>
  <itunes:title>When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy &amp; What’s Next</itunes:title>
  <title>When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy &amp; What’s Next</title>

    <enclosure length="31368098" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/b5b7607f-e6f9-4076-b5ce-6833cf6113b4.mp3" />
  <itunes:duration>00:32:40</itunes:duration>
    <guid isPermaLink="false">b5b7607f-e6f9-4076-b5ce-6833cf6113b4</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>35</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/ut8tW4e-kpjeXQcWuT_BHp3Dxrz4nN3ePBj-cjc9ozc/resize:fill:1500:1500/plain/artwork/6854d968-e7ac-4334-8c2c-bd76fbb2aeb6/exploited-the-cyber-truth/when-vehicles-arent-just-machines-cybersecurity-autonomy-whats-next-1766069467.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 18 Dec 2025 14:51:06 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Open source accelerates development in embedded systems, but hidden license obligations can quickly create legal and operational risk. In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and Salim Blume, Director of Security Applications, for a look at how copyleft risk emerges and why compliance in embedded products is more challenging than many teams expect.</p>

<p>Salim breaks down how restrictive licenses, such as GPL and AGPL, can force the disclosure of proprietary code, interrupt product shipments, or create exposure long after devices are deployed in the field. Joe shares why accurate SBOMs, automated license checks, and enforcing policy at build time are critical to preventing surprises in downstream products. The discussion also touches on the ongoing Vizio case, where the TV manufacturer faces litigation that could compel public release of source code under the GPL, highlighting how open source obligations can surface years after products hit the market.</p>

<p>Together, Paul, Joe, and Salim explore:</p>

<ul><li>How copyleft obligations can require source-code disclosure</li><li>Why embedded environments complicate license compliance</li><li>Real-world cases where unnoticed GPL dependencies caused major issues, such as Vizio’s GPL lawsuit and Cisco’s WRT54G router family</li><li>The growing implications of AGPL for SaaS and connected services</li><li>How build-time SBOMs and automated controls reduce long-term risk</li></ul>

<p>Whether you're building connected devices, managing software supply chain compliance, or protecting proprietary IP, this episode offers practical guidance to reduce copyleft risk before it becomes a costly problem.</p>]]>
  </description>
  <itunes:title>When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems</itunes:title>
  <title>When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems</title>

    <enclosure length="28329963" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/e5eb055d-ef45-4d05-beee-ccf2355bdb92.mp3" />
  <itunes:duration>00:29:30</itunes:duration>
    <guid isPermaLink="false">e5eb055d-ef45-4d05-beee-ccf2355bdb92</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>34</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/9J01jXlD2rbK7U-vRcBvs8szE0YJN0bGrKE_rz9VRyY/resize:fill:1500:1500/plain/artwork/f047a9b4-fceb-4e21-aa6c-7bb2e426ad05/exploited-the-cyber-truth/when-open-source-gets-you-into-hot-water-copyleft-risk-in-embedded-systems-1765466082.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 11 Dec 2025 15:14:41 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin sits down with RunSafe Founder and CEO Joseph M. Saunders to explore why the future of cyber defense depends on disrupting attacker economics rather than racing to keep up with every new threat.</p>

<p>Joe breaks down how organizations can gain an asymmetric advantage by reducing exploitability across entire classes of vulnerabilities, especially persistent memory safety flaws that continue to expose critical systems. He shares why adding lightweight, automated protections at build time is one of the fastest ways to shift the cost curve onto attackers without forcing massive code rewrites or slowing development teams down.</p>

<p>Together, Paul and Joe discuss:</p>

<ul><li>Why attackers’ resource advantage requires a new defensive mindset</li><li>The power of “patchless” protection in embedded and OT environments</li><li>Why memory safety flaws persist and how to neutralize them at scale</li><li>The risks of AI-generated code and how to prevent silent vulnerabilities</li><li>How Secure by Design practices improve resilience for critical infrastructure</li></ul>

<p>If you're responsible for securing embedded systems, OT assets, or long-lived devices where patch cycles are slow and risk is high, this episode offers a new mindset that gives defenders the upper hand.</p>]]>
  </description>
  <itunes:title>The Asymmetric Advantage: How Cybersecurity Can Outpace Adversaries</itunes:title>
  <title>The Asymmetric Advantage: How Cybersecurity Can Outpace Adversaries</title>

    <enclosure length="26216323" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/ce6b95d5-2116-43df-a885-f5ec9a11a5b4.mp3" />
  <itunes:duration>00:27:18</itunes:duration>
    <guid isPermaLink="false">ce6b95d5-2116-43df-a885-f5ec9a11a5b4</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>33</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/ijF0SWK08yAH9CgNh39gbbfFM2BhpoXMI1KvPcg-lA4/resize:fill:1500:1500/plain/artwork/a1488fdc-7cf2-41fe-81b7-0587442734c6/exploited-the-cyber-truth/the-asymmetric-advantage-how-cybersecurity-can-outpace-adversaries-1764861219.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 04 Dec 2025 15:13:38 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>As OT environments face rising geopolitical tensions, ransomware threats, and aging infrastructure, vulnerability management has never been more complex. In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and Stuxnet expert Ralph Langner, Founder and CEO of Langner, Inc.</p>

<p>Ralph shares from his decades of firsthand experience defending industrial control systems and explains why traditional CVE-focused vulnerability management falls short in OT. He breaks down the three major categories of OT vulnerabilities—design flaws, feature abuse, and configuration errors—and reveals why competent attackers often ignore CVEs entirely. Joe highlights how memory-based vulnerabilities continue to threaten critical systems and why eliminating entire vulnerability classes can create an asymmetric advantage for defenders.</p>

<p>Together, Ralph and Joe explore:</p>

<ul><li>Why most OT equipment remains insecure by design and why replacement will take decades</li><li>How features, not bugs, often become the real attack vector</li><li>The growing role of ransomware and IT-side weaknesses in OT compromises</li><li>Practical steps OT defenders can take today to incrementally improve resilience</li><li>The value of class-level protections, better architectures, and secure development processes</li></ul>

<p>Whether you secure energy infrastructure, manufacturing systems, or mixed IT/OT networks, this episode delivers experience-driven guidance for strengthening cyber-physical resilience.</p>]]>
  </description>
  <itunes:title>Smarter Vulnerability Management in OT Systems: Building Resilience</itunes:title>
  <title>Smarter Vulnerability Management in OT Systems: Building Resilience</title>

    <enclosure length="27252466" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/3a69b072-8489-4174-9408-1452029234ba.mp3" />
  <itunes:duration>00:28:23</itunes:duration>
    <guid isPermaLink="false">3a69b072-8489-4174-9408-1452029234ba</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>32</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/sINCV5CkqWYP8AUJWi9m5T7B5jHLCvwCIbiJfVL_95o/resize:fill:1500:1500/plain/artwork/6b8d4514-7c4c-4100-b250-9e1f362ddf5d/exploited-the-cyber-truth/smarter-vulnerability-management-in-ot-systems-building-resilience-1763645797.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 20 Nov 2025 13:36:36 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>AI is fueling both innovation and new attack tactics. In this episode of <i>Exploited: The Cyber Truth,</i> host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and Kelly Davis, Senior Solutions Architect at Glasswall, to uncover how AI-powered malware is slipping through traditional detection in federal and defense environments—and what can be done about it.</p>

<p>Kelly breaks down how “clean file” strategies are redefining cybersecurity by ensuring only safe, verified content enters critical systems. Joe connects these insights to operational technology (OT), where malicious code can disrupt industrial operations, safety systems, and even national infrastructure.</p>

<p>Together, they explore:</p>

<ul><li>How AI is changing both attack and defense in cybersecurity</li><li>Why detection-based security is too slow—and how AI is widening the gap</li><li>How Content Disarm and Reconstruction (CDR) strengthens federal and defense workflows</li><li>How federal agencies can adopt file-level defenses using pilots, boundary controls, and workflow APIs</li><li>The parallels between clean files in IT and secure binaries in OT</li></ul>

<p>Whether you’re defending national assets or securing industrial systems, this episode reveals why prevention—not detection—is the smartest defense in the AI era.</p>]]>
  </description>
  <itunes:title>Clean Files, Safe Operations: Defending Federal and OT Systems from AI-Driven Threats</itunes:title>
  <title>Clean Files, Safe Operations: Defending Federal and OT Systems from AI-Driven Threats</title>

    <enclosure length="25716030" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/616c03d0-61ec-4df1-9d4f-5434885f4f68.mp3" />
  <itunes:duration>00:26:47</itunes:duration>
    <guid isPermaLink="false">616c03d0-61ec-4df1-9d4f-5434885f4f68</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>31</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/gSGhMSFrbtOvq2-SdNf4ugx6gCUjvjphG70wq0xuf2g/resize:fill:1500:1500/plain/artwork/527bd065-aa30-4088-aa8d-a167ac90ba76/exploited-the-cyber-truth/clean-files-safe-operations-defending-federal-and-ot-systems-from-ai-driven-threats-1763048572.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 13 Nov 2025 15:42:19 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>As healthcare becomes increasingly connected, cybersecurity is now as critical to patient safety as the devices themselves. In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin sits down with RunSafe Security Founder and CEO Joseph M. Saunders to explore how medical device manufacturers can design protection into every phase of product development—from concept to deployment and beyond.</p>

<p>Joe discusses how medical device manufacturers are aligning innovation with evolving FDA and CISA cybersecurity expectations, embedding secure-by-design principles, and redefining engineering culture to treat security as part of product quality and not just compliance.</p>

<p>Listeners will learn:</p>

<ul><li>Why Secure by Design is critical for building safe, resilient medical devices from the start</li><li>How FDA guidance has pushed manufacturers to treat cybersecurity as part of product design and is reshaping compliance in healthcare</li><li>What a Software Bill of Materials (SBOM) is and why generating it at build time gives the clearest picture of software risk</li><li>Why openness about software components helps reduce risk, even when it feels counterintuitive</li><li>How standardizing development practices makes devices safer, lowers costs, and leaves more room for innovation</li><li><br /></li></ul>

<p>For those developing life-critical devices or managing medtech risk, this episode explores how building security into every stage of design and development protects patients and sustains innovation in connected care.</p>]]>
  </description>
  <itunes:title>Designing Security into Life-Critical Devices: Where Innovation Meets Regulation</itunes:title>
  <title>Designing Security into Life-Critical Devices: Where Innovation Meets Regulation</title>

    <enclosure length="26069223" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/5f2c8fb1-4c4b-42f6-a31c-b30cfe17f225.mp3" />
  <itunes:duration>00:27:09</itunes:duration>
    <guid isPermaLink="false">5f2c8fb1-4c4b-42f6-a31c-b30cfe17f225</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>30</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/REIeJ99U0a07xKGWE1ydxiwW4uJlFnCOjzeyRjlD9R0/resize:fill:1500:1500/plain/artwork/8e66af33-e04a-4811-b71d-1410cbdc78fe/exploited-the-cyber-truth/designing-security-into-life-critical-devices-where-innovation-meets-regulation-1762442190.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 06 Nov 2025 15:16:27 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>When we think of generative AI in defense, many think of how it will be used on the frontlines. But it actually serves a much wider purpose in helping warfighters plan, prepare, and execute missions. In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and Arthur Reyenger, Generative AI Strategy Executive at Ask Sage, Inc., to explore how generative AI is transforming defense missions—from planning to execution.</p>

<p>They discuss how AI-driven decision support, predictive analytics, and digital twins are giving defense teams faster insights and tactical advantages while maintaining trust, security, and control. The conversation looks at examples of how AI is accelerating acquisition processes, strengthening cybersecurity, and even supporting front-line logistics aboard Navy vessels.</p>

<p>Together, Joe and Arthur discuss:</p>

<ul><li>How generative AI accelerates decision-making and mission readiness</li><li>The role of commercial off-the-shelf (COTS) AI in defense innovation</li><li>Why responsible AI and human oversight remain critical</li><li>How secure, scalable platforms are redefining operational impact</li></ul>

<p>Whether you’re in defense, cybersecurity, or technology leadership, this episode sheds light on how generative AI is helping warfighters stay one step ahead.</p>]]>
  </description>
  <itunes:title>How Generative AI Is Addressing Warfighter Challenges</itunes:title>
  <title>How Generative AI Is Addressing Warfighter Challenges</title>

    <enclosure length="29453028" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/86ff70af-ddab-4804-8d1f-3265644e34a6.mp3" />
  <itunes:duration>00:30:40</itunes:duration>
    <guid isPermaLink="false">86ff70af-ddab-4804-8d1f-3265644e34a6</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>29</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/4Syh02yk2wp1Ky5zKNxqSDYPHhfX4BzHOqSKUAr1Jm4/resize:fill:1500:1500/plain/artwork/011c9a30-7ebc-4114-b315-6a781dd90779/exploited-the-cyber-truth/how-generative-ai-is-addressing-warfighter-challenges-1761832646.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 30 Oct 2025 13:57:24 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>CISA and DHS have raised the bar for software transparency with the first major update to the <i>Minimum Elements for an SBOM</i> since 2021—expanding what every software supplier must disclose. But what does this really mean for developers, embedded system teams, and security leaders trying to protect critical infrastructure?</p>

<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security’s Kelli Schwalm and CEO Joseph Saunders to unpack the technical and strategic impact of the 2025 SBOM draft.</p>

<p>Kelli explains key additions like component hashes, generation context, and transitive dependencies, and how they improve accuracy and traceability. Joe connects the dots to the bigger picture—how richer SBOMs enable resilience, transparency, and safer disclosure practices across the software supply chain.</p>

<p>Together, they explore:</p>

<ul><li>Why new SBOM data fields (like hashes and license metadata) matter for risk mitigation</li><li>The ongoing challenges of SBOMs for embedded and C/C++ systems</li><li>How stronger visibility supports secure vulnerability disclosure and compliance</li><li>Why SBOMs are evolving from check-box compliance to core resilience tools</li></ul>

<p>Whether you manage embedded software, oversee product security, or shape compliance policy, this episode reveals how the 2025 SBOM Minimum Elements is set to reshape software assurance for years to come.</p>]]>
  </description>
  <itunes:title>What the 2025 SBOM Minimum Elements Mean for Software Supply Chain Security</itunes:title>
  <title>What the 2025 SBOM Minimum Elements Mean for Software Supply Chain Security</title>

    <enclosure length="32154321" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/d3d1205c-1f34-4eeb-afd5-34c8a9ebacf8.mp3" />
  <itunes:duration>00:33:29</itunes:duration>
    <guid isPermaLink="false">d3d1205c-1f34-4eeb-afd5-34c8a9ebacf8</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>28</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/19JKue_NDq1WgU5hSV1V259Zn5ou9wH0UcGM8UYwEsg/resize:fill:1500:1500/plain/artwork/c075bd36-9d3f-4020-bc43-c0c237478f45/exploited-the-cyber-truth/what-the-2025-sbom-minimum-elements-mean-for-software-supply-chain-security-1761833376.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 23 Oct 2025 15:42:58 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Safeguarding critical infrastructure demands more than just technology—it requires unity. In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin sits down with RunSafe Security CEO Joseph M. Saunders and Madison Horn, National Security &amp; Critical Infrastructure Advisor at World Wide Technology, to explore how collaboration across government and industry is shaping a stronger, more secure future.</p>

<p>Madison shares insights from her work bridging the gap between policymakers and technologists, highlighting what “best-in-class” public-private partnerships look like and why security by design is a shared responsibility. Together, Madison and Joe unpack how AI, geopolitics, and legacy systems intersect in today’s cyber threat landscape and what it will take to build lasting resilience.</p>

<p>From aligning economic incentives to enabling secure-by-design innovation, this discussion underscores one essential truth: protecting critical infrastructure isn’t just a technical mission—it’s a collective one.</p>

<p><b>In this episode, you’ll learn:</b></p>

<ul><li>How collaboration between government and industry drives national cyber resilience</li><li>What “best-in-class” public-private partnerships look like in practice</li><li>The challenges of protecting legacy systems that were never built to be online</li><li>How AI and emerging technologies are reshaping cyber defense and regulation</li><li>Why secure-by-design principles must become a shared responsibility</li><li>Where current policies succeed—and where leaders can push for meaningful change</li></ul>]]>
  </description>
  <itunes:title>Collaboration in Cyberspace with Madison Horn</itunes:title>
  <title>Collaboration in Cyberspace with Madison Horn</title>

    <enclosure length="28271848" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/ef45baad-066c-4b4c-9e4c-d3a9fc335a03.mp3" />
  <itunes:duration>00:29:26</itunes:duration>
    <guid isPermaLink="false">ef45baad-066c-4b4c-9e4c-d3a9fc335a03</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>27</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/7y04Kx__KIMawsSWFRd8IESezkyJyqH0ncfBcL4tDTM/resize:fill:1500:1500/plain/artwork/8ad8db51-700e-498e-9cf3-5646749ca7e3/exploited-the-cyber-truth/collaboration-in-cyberspace-with-madison-horn-1760625049.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 16 Oct 2025 14:30:48 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>The software supply chain often gets all the attention, but what about its foundation? In this episode of <i>Exploited: The Cyber Truth</i>, RunSafe Security Founder and CEO Joseph M. Saunders explores why securing the firmware supply chain is critical as attackers look to target the lowest layers of devices.</p>

<p>Joe explains how firmware vulnerabilities in embedded and connected devices—across healthcare, automotive, energy, and defense—can be exploited at scale, and why legacy assumptions about firmware trust are no longer enough. Listeners will learn:</p>

<ul><li>Tactics adversaries use to exploit firmware vulnerabilities</li><li>Risks inherited from third-party firmware and complex supply chains</li><li>How “shifting security down the stack” enhances trust for all systems above it</li><li>Practical steps CISOs, security leaders, and device manufacturers can take to harden firmware</li></ul>

<p>This episode uncovers an often-overlooked attack surface, showing why securing firmware is a strategic priority for reducing risk at scale.</p>]]>
  </description>
  <itunes:title>Risk Reduction at the Core: Securing the Firmware Supply Chain</itunes:title>
  <title>Risk Reduction at the Core: Securing the Firmware Supply Chain</title>

    <enclosure length="30553431" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/2d7a03f2-7c7b-4e45-87c9-e6505411491a.mp3" />
  <itunes:duration>00:31:19</itunes:duration>
    <guid isPermaLink="false">2d7a03f2-7c7b-4e45-87c9-e6505411491a</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>26</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/vMRWif6w3kxq4biq3mdEA8dFWNBa559XTzAZn8MKiEY/resize:fill:1500:1500/plain/artwork/f1789143-bbfb-4f84-b901-558ddb10f91e/exploited-the-cyber-truth/risk-reduction-at-the-core-securing-the-firmware-supply-chain-1760018994.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 09 Oct 2025 14:09:53 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>As manufacturing systems and industrial control devices become increasingly connected, attackers are finding new ways to hijack machines, disrupt operations, and steal intellectual property. In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin and RunSafe Security Founder and CEO Joseph M. Saunders break down how embedded threats unfold and why manufacturers are in the crosshairs.</p>

<p>Joe shares real-world examples of water system breaches, programmable logic controller (PLC) exploits, and the dangers of memory-unsafe code that persists across legacy and modern systems. He explains how attackers weaponize software supply chain weaknesses and software determinism—and why preventing exploitation at build time is critical.</p>

<p>Topics discussed include:</p>

<ul><li>How adversaries infiltrate embedded and industrial devices</li><li>The role of nation-state motivations, economic espionage, and insider threats</li><li>Why memory-unsafe languages remain a root cause of critical vulnerabilities</li><li>How Secure by Design practices and runtime protections can harden devices without disrupting operations</li><li>What manufacturers must watch as AI-driven attack paths begin to emerge</li></ul>

<p>For leaders responsible for protecting industrial systems, this episode offers a clear-eyed look at the risks and practical strategies to defend machines before they get hacked.</p>

<p><br /></p>

<p><br /></p>]]>
  </description>
  <itunes:title>When Machines Get Hacked: A Manufacturer’s Guide to Embedded Threats</itunes:title>
  <title>When Machines Get Hacked: A Manufacturer’s Guide to Embedded Threats</title>

    <enclosure length="28520950" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/306b0341-9fde-4ab1-9c1f-7b4176e29706.mp3" />
  <itunes:duration>00:29:42</itunes:duration>
    <guid isPermaLink="false">306b0341-9fde-4ab1-9c1f-7b4176e29706</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>25</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/F3EulFIzSi9a_YO0NwiCZNL_n4KfL3CXFLUJj2cy4AE/resize:fill:1500:1500/plain/artwork/0dc5001c-d4b9-446b-9878-2b91d0a07528/exploited-the-cyber-truth/when-machines-get-hacked-a-manufacturers-guide-to-embedded-threats-1759415341.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 02 Oct 2025 14:27:53 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>As advanced weapons platforms become increasingly software-driven, cybersecurity has emerged as a frontline concern for Aerospace &amp; Defense. In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin and RunSafe Security CEO <a href="https://runsafesecurity.com/team/joseph-saunders/" target="_blank">Joseph M. Saunders</a> welcome <a href="https://runsafesecurity.com/blog/team/dave-salwen/" target="_blank">Dave Salwen,</a> VP of Embedded Systems at RunSafe Security, for a deep dive into the cultural and technical shifts required to defend tomorrow’s arsenal.</p>

<p>Dave explains why applying enterprise IT security models to mission-critical weapon systems is dangerously inadequate, how long patch cycles and software reuse create systemic vulnerabilities, and why proactive defense against unknown threats is essential. The conversation explores:</p>

<ul><li>How adversaries exploit software flaws in unpatched, mission-critical systems</li><li>Why cultural change inside the DoD and its ecosystem is as vital as its technical defenses</li><li>The role of Secure by Design in weapons development lifecycles</li><li>The risks of open-source and supply chain dependencies in defense programs</li><li>Why resilience and runtime defenses are critical to mission survivability</li></ul>

<p>For defense leaders, program managers, and technologists, this episode highlights how adopting a new mindset around weapons cybersecurity is key to safeguarding national security.</p>]]>
  </description>
  <itunes:title>Weapons Cybersecurity: The Challenges Facing Aerospace and Defense</itunes:title>
  <title>Weapons Cybersecurity: The Challenges Facing Aerospace and Defense</title>

    <enclosure length="27880262" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/2659c731-bc3e-4091-8e89-31acc080f12c.mp3" />
  <itunes:duration>00:29:02</itunes:duration>
    <guid isPermaLink="false">2659c731-bc3e-4091-8e89-31acc080f12c</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>24</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/ifk0TSHrz7MPZpZfWgi9mloTLYAp8v0V-u4pgvxenwg/resize:fill:1500:1500/plain/artwork/bd6f87da-ac08-4b6d-a73d-8e91ba78d122/exploited-the-cyber-truth/weapons-cybersecurity-the-challenges-facing-aerospace-and-defense-1758809097.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/weapons-cybersecurity-the-challenges-facing-aerospace-and-defense</link>
    <pubDate>Thu, 25 Sep 2025 14:04:56 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Taiwan sits at the heart of the global economy, producing nearly 90% of the world’s advanced semiconductors. But with 2.4 million cyberattacks hitting the island daily, could a digital siege cripple it before a single missile is launched?</p>

<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin and RunSafe Security CEO and Founder Joseph M. Saunders examine Taiwan’s fragile critical infrastructure, exposed undersea cables, and dependence on imported energy—weaknesses that adversaries could exploit through cyber warfare and gray-zone tactics.</p>

<p>Drawing lessons from Ukraine and Israel, Joe and Paul explore:</p>

<ul><li>How Taiwan’s semiconductor “super sector” makes it a global cyber target</li><li>Why energy and telecom resilience are linchpins of national survival</li><li>The role of software supply chain security and memory safety in defense</li><li>How the same cyber playbook could threaten U.S. and allied infrastructure</li></ul>

<p>This sobering conversation underscores a vital truth: in the age of hybrid warfare, digital resilience is deterrence itself.</p>]]>
  </description>
  <itunes:title>Can Taiwan Survive a Digital Siege?</itunes:title>
  <title>Can Taiwan Survive a Digital Siege?</title>

    <enclosure length="29485517" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/e8683291-9be5-4795-a8b2-bdb542efc299.mp3" />
  <itunes:duration>00:30:12</itunes:duration>
    <guid isPermaLink="false">e8683291-9be5-4795-a8b2-bdb542efc299</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>23</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/y8OapPq_48H6l8lIkSvAUCxggb2wQD_YPNByiF5ZWBY/resize:fill:1500:1500/plain/artwork/da70a397-4a72-4583-b5b7-1fa3949465b4/exploited-the-cyber-truth/can-taiwan-survive-a-digital-siege-1758204015.jpg" />
      <link>https://runsafesecurity.com/exploited-the-cyber-truth-podcast/</link>
    <pubDate>Thu, 18 Sep 2025 14:00:14 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Is patching enough to secure critical systems? In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin sits down with Joe Saunders, Founder and CEO of RunSafe Security, to challenge the idea that vulnerabilities can be solved after software ships.</p>

<p>Joe explains why embedded systems and critical infrastructure demand a different approach—one that builds protections in from the start. He unpacks:</p>

<ul><li>Why patching after deployment creates dangerous gaps for attackers</li><li>How build-time memory safety and code-hardening disrupt exploitation</li><li>The software supply chain risks of relying on incomplete SBOMs</li><li>Real-world examples of how build-time defenses reduce costly downtime and post-production scrambles</li></ul>

<p>If you’re leading a program of record, developing embedded systems, or managing software security, this conversation reveals why “Secure by Design” is the only way forward.</p>]]>
  </description>
  <itunes:title>Build-Time Protections vs. Post-Production Panic</itunes:title>
  <title>Build-Time Protections vs. Post-Production Panic</title>

    <enclosure length="33763856" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/e79f3d42-ab0d-4eca-80d5-19bbdd06037f.mp3" />
  <itunes:duration>00:35:10</itunes:duration>
    <guid isPermaLink="false">e79f3d42-ab0d-4eca-80d5-19bbdd06037f</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>22</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/tR2bpMqqDUX6fjBij2Gc7ofRmdDI2Zv8pTV9F-ueGBc/resize:fill:1500:1500/plain/artwork/6a32ca9c-887e-4d0b-b66b-17d52c674bdd/exploited-the-cyber-truth/build-time-protections-vs-post-production-panic-1757599593.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/build-time-protections-vs-post-production-panic</link>
    <pubDate>Thu, 11 Sep 2025 14:06:32 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What do drivers really think about the cyber and safety risks in connected and autonomous vehicles? In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin speaks with Joe Saunders, CEO and Founder of RunSafe Security, about the findings from RunSafe’s <a href="https://runsafesecurity.com/report/connected-car-security-index-2025/" target="_blank">2025 Connected Car Cyber Safety &amp; Security Survey.</a> With responses from 2,000 drivers across the U.S., U.K., and Germany, the survey uncovers how consumers weigh safety, privacy, and trust in the cars of today and tomorrow.</p>

<p>Joe shares insights into:</p>

<ul><li>Why <b>65% of drivers believe remote hacking is possible</b></li><li>Why <b>79% prioritize physical safety over personal data privacy</b></li><li>How <b>87% say strong cybersecurity would influence their buying decision</b></li><li>The role of <b>over-the-air updates</b> and what consumers fear most about them</li><li>How <b>trust in cybersecurity could shape brand loyalty</b> alongside performance and fuel economy</li></ul>

<p>Tune in to learn why cybersecurity is quickly becoming the next must-have feature for connected vehicles.</p>]]>
  </description>
  <itunes:title>What Drivers Really Think About Connected Car Safety</itunes:title>
  <title>What Drivers Really Think About Connected Car Safety</title>

    <enclosure length="26781014" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/a762906a-cd61-4f89-b45d-8b08938093cf.mp3" />
  <itunes:duration>00:27:53</itunes:duration>
    <guid isPermaLink="false">a762906a-cd61-4f89-b45d-8b08938093cf</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>21</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/jHD6MTyaCTGzKEwBBO8ueyg3xjtYjNMPRKqJT_4SfII/resize:fill:1500:1500/plain/artwork/9e89c9a3-67aa-46c7-a83f-bf4998716dd3/exploited-the-cyber-truth/what-drivers-really-think-about-connected-car-safety-1756993834.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/what-drivers-really-think-about-connected-car-safety</link>
    <pubDate>Thu, 04 Sep 2025 13:50:33 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How do you respond when a vulnerability opens the door to your most sensitive data? In this urgent episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and special guest Ron Reiter, CTO and co-founder of Sentra, to dissect the SharePoint vulnerabilities (CVE-2025-53770 and CVE-2025-53771) that have already impacted hundreds of organizations, including U.S. government agencies.</p>

<p>Ron explains why this remote code execution flaw is more dangerous than most, how attackers exploit unauthenticated access to steal contracts, customer records, and intellectual property, and why patching alone won’t keep systems safe. Joe underscores the downstream risks for operational technology (OT), where attackers can pivot from IT breaches to disrupt industrial environments.</p>

<p>You’ll learn:</p>

<ul><li>Why SharePoint servers are a high-value target for attackers</li><li>The real risk when IT breaches spill into OT environments</li><li>Why compliance isn’t enough without true customer data protection</li><li>Three  steps for security leaders to gain an organization-wide view of cyber security</li></ul>

<p>This episode is a wake-up call for integrated, resilient cybersecurity that safeguards both corporate data and critical operations.</p>]]>
  </description>
  <itunes:title>When IT Falls, OT Follows: Inside the SharePoint Breach with Ron Reiter</itunes:title>
  <title>When IT Falls, OT Follows: Inside the SharePoint Breach with Ron Reiter</title>

    <enclosure length="28687325" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/6c19a1ba-8f9b-447c-b016-8a010c66fdf6.mp3" />
  <itunes:duration>00:29:52</itunes:duration>
    <guid isPermaLink="false">6c19a1ba-8f9b-447c-b016-8a010c66fdf6</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>20</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/vvuTBMJ5-5ffdy-SJkpdZi4PFnJQUu6UqoqhDI1qV3Y/resize:fill:1500:1500/plain/artwork/a3ddc254-fe9c-4010-a150-e72ea9fba04a/exploited-the-cyber-truth/when-it-falls-ot-follows-inside-the-sharepoint-breach-with-ron-reiter-1756385675.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/when-it-falls-ot-follows-inside-the-sharepoint-breach-with-ron-reiter</link>
    <pubDate>Thu, 28 Aug 2025 12:54:34 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How do you protect the beating heart of modern manufacturing—smart factories—from equally smart attackers?</p>

<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin speaks with Joe Saunders, CEO and Founder of RunSafe Security, about the complex risks inside today’s highly connected industrial environments.</p>

<p>Joe shares insights into:</p>

<ul><li>Why the Purdue security model falls short in the cloud and IoT era</li><li>How attackers gain value from even “read-only” factory access</li><li>The role of standards like IEC 62443 in raising security posture</li><li>Why software quality and Secure by Design practices matter as much as compliance</li><li>Extending the life of legacy systems with memory safety protections</li></ul>

<p>From factory floor sensors to enterprise IT systems, this conversation unpacks what manufacturers, suppliers, and operators can do to stay one step ahead of motivated adversaries.</p>]]>
  </description>
  <itunes:title>Protecting Smart Factories from Smart Attackers</itunes:title>
  <title>Protecting Smart Factories from Smart Attackers</title>

    <enclosure length="28715742" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/3c06f895-6ed0-4beb-9b69-6f213044ad88.mp3" />
  <itunes:duration>00:29:54</itunes:duration>
    <guid isPermaLink="false">3c06f895-6ed0-4beb-9b69-6f213044ad88</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>19</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/h5DE_isFhPrufU2WEPBuumPkII-5YgCugBvLpxOvBx0/resize:fill:1500:1500/plain/artwork/899537fa-b43a-49a8-b17d-8a3fb6958c0e/exploited-the-cyber-truth/protecting-smart-factories-from-smart-attackers-1755785986.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/protecting-smart-factories-from-smart-attackers</link>
    <pubDate>Thu, 21 Aug 2025 14:17:48 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>DEF CON 33 put the maritime industry in the hacker’s crosshairs for the first time and the results were eye-opening. In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin sits down with Joe Saunders, CEO of RunSafe Security, and RunSafe’s Shiv Saxena to unpack what happened inside the Maritime Hacking Village and what it means for the future of industrial control systems (ICS) and operational technology (OT) security.</p>

<p>From breaking into an autonomous narco sub and a real-world port crane to candid discussions about legacy system vulnerabilities, the conversation dives into the most surprising takeaways from Las Vegas—and why they matter for national security.</p>

<p>You’ll hear:</p>

<ul><li>What DEF CON revealed about ICS and OT risks</li><li>How maritime pros are rethinking security priorities</li><li>Why legacy code and memory safety remain urgent challenges</li><li>The role public hacking events play in strengthening critical infrastructure defenses</li></ul>

<p>Whether you were there in person or following from afar, this insider debrief delivers lessons every security leader can act on now.</p>]]>
  </description>
  <itunes:title>After DEF CON: What the Maritime Hacking Village Revealed About Real-World ICS Risk</itunes:title>
  <title>After DEF CON: What the Maritime Hacking Village Revealed About Real-World ICS Risk</title>

    <enclosure length="29241535" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/501981f2-deec-4c1a-a2d7-00b7abd94182.mp3" />
  <itunes:duration>00:30:27</itunes:duration>
    <guid isPermaLink="false">501981f2-deec-4c1a-a2d7-00b7abd94182</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>18</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/mJsFWn_dRmTO8v2KFcPlGqh4A1JxZm9FZc3gFIIgpXs/resize:fill:1500:1500/plain/artwork/f4bad7a1-0709-48c3-a6d0-632d8801c5a1/exploited-the-cyber-truth/after-def-con-what-the-maritime-hacking-village-revealed-about-real-world-ics-risk-1755182026.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/after-def-con-what-the-maritime-hacking-village-revealed-about-real-world-ics-risk</link>
    <pubDate>Thu, 14 Aug 2025 14:33:45 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Can defense programs achieve both innovation and compliance—without compromising security?</p>

<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by Joe Saunders, CEO of RunSafe Security, for a deep dive into the balancing act of rapid software development and strict regulatory demands in the defense sector.</p>

<p>Joe shares first-hand insights into:</p>

<ul><li>The risks of layered supplier networks and open-source dependencies</li><li>How automated Secure by Design solutions support both resilience and speed</li><li>The vital role of transparency and full Software Bills of Materials (SBOMs)</li><li>Why deterministic behavior is key in real-time, safety-critical systems</li><li>How DevSecOps and CI/CD pipelines can streamline compliance and security</li></ul>

<p>Whether you're leading a program of record, managing cyber risk, or modernizing embedded systems, this conversation equips you with actionable strategies to futureproof your software while meeting mission timelines.</p>]]>
  </description>
  <itunes:title>Software Assurance at Mission Speed: Securing Code Without Delaying Programs</itunes:title>
  <title>Software Assurance at Mission Speed: Securing Code Without Delaying Programs</title>

    <enclosure length="30298542" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/97c3f381-e794-4c04-a6a0-875afa6fdd0d.mp3" />
  <itunes:duration>00:31:33</itunes:duration>
    <guid isPermaLink="false">97c3f381-e794-4c04-a6a0-875afa6fdd0d</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>17</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/ZtMttLz9AR8AXGGabAzbSPk4zMjZSp9oQBc4-NzFPik/resize:fill:1500:1500/plain/artwork/c70e8cbe-4525-40ec-aebb-804af0c7b39c/exploited-the-cyber-truth/software-assurance-at-mission-speed-securing-code-without-delaying-programs-1754569942.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/software-assurance-at-mission-speed-securing-code-without-delaying-programs</link>
    <pubDate>Thu, 07 Aug 2025 12:32:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>As vehicles edge closer to full autonomy, cybersecurity becomes a make-or-break component of innovation. In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and special guest Gabriel Gonzalez, Director of Hardware Security at IOActive, for an insider’s look at embedded security in the automotive industry.</p>

<p>Gabriel shares eye-opening research into telematics vulnerabilities that could allow attackers to remotely control vehicles—underscoring the critical need for proactive defense. Joe explains why hardening systems at build time and securing complex supply chains are essential steps toward resilience.</p>

<p>Together, Joe and Gabriel explore:</p>

<ul><li>The consequences of insecure MQTT configurations in fleet vehicles</li><li>The evolving role of memory safety in embedded system defense</li><li>The importance of security-by-design in the automotive SDLC</li><li>The value of third-party researcher collaboration in vulnerability discovery</li></ul>

<p>Whether you build ECUs, design infotainment systems, or oversee cyber risk across a fleet, this episode reveals how collaboration between researchers, OEMs, and security experts is driving a safer future for connected vehicles.</p>]]>
  </description>
  <itunes:title>From Research to Resilience: Securing the Future of Autonomous Vehicles</itunes:title>
  <title>From Research to Resilience: Securing the Future of Autonomous Vehicles</title>

    <enclosure length="28631340" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/682ef11a-49af-4f4b-bb4f-ee59e50de1c5.mp3" />
  <itunes:duration>00:29:49</itunes:duration>
    <guid isPermaLink="false">682ef11a-49af-4f4b-bb4f-ee59e50de1c5</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>16</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/ev-Ok_Kw39YQKAWvucgTgOvecDPbVLTUSyFHBzHQq3s/resize:fill:1500:1500/plain/artwork/fa663186-4aa0-4d7d-864e-68f05f4fed1c/exploited-the-cyber-truth/from-research-to-resilience-securing-the-future-of-autonomous-vehicles-1753962998.jpg" />
      <link>https://runsafesecurity.com/podcast/securing-autonomous-vehicles/</link>
    <pubDate>Thu, 31 Jul 2025 11:56:37 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, RunSafe Security CEO Joe Saunders joins host Paul Ducklin to confront a troubling reality: Iranian and pro-Iranian threat actors are targeting critical infrastructure in the United States. From small-town water utilities to nationwide energy providers, the systems we rely on every day are increasingly vulnerable.</p>

<p>Joe explains how groups like CyberAv3ngers—linked to the IRGC—are exploiting weak security in industrial control systems (ICS) and operational technology (OT). Their tactics aren’t always sophisticated, but they are effective: default passwords, outdated software, and internet-exposed devices are all they need to lock operators out and take control.</p>

<p>This urgent conversation explores:</p>

<ul><li>What we know about recent cyber campaigns targeting PLCs and HMIs</li><li>How poorly secured infrastructure becomes a launchpad for nation-state actors</li><li>What disruptions mean for national security and public health</li><li>What municipalities, vendors, and regulators can do today to improve defenses</li></ul>

<p>Whether you’re a system operator, vendor, or policymaker, this episode will leave you with a clearer picture of the risks—and what’s at stake.</p>]]>
  </description>
  <itunes:title>Iranian Hackers and the Threat to US Critical Infrastructure</itunes:title>
  <title>Iranian Hackers and the Threat to US Critical Infrastructure</title>

    <enclosure length="28543138" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/c4282bd5-659d-49f3-8da7-18395a1a6353.mp3" />
  <itunes:duration>00:29:43</itunes:duration>
    <guid isPermaLink="false">c4282bd5-659d-49f3-8da7-18395a1a6353</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>15</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/e8Tg3d6k7nIyC8_2vNc5gP893G7y8B94JZyHvnhuD-k/resize:fill:1500:1500/plain/artwork/f4b0b455-56b9-4201-92c6-f676bad59af5/exploited-the-cyber-truth/iranian-hackers-and-the-threat-to-us-critical-infrastructure-1753365772.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/iranian-hackers-and-the-threat-to-us-critical-infrastructure</link>
    <pubDate>Thu, 24 Jul 2025 14:01:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, we go below deck to expose the vulnerabilities lurking in the digital systems steering today’s maritime operations.</p>

<p>RunSafe Security CEO Joe Saunders and special guest Duncan Woodbury—CEO of Liberas and Executive Director of the Maritime Hacking Village at DEF CON—join host Paul Ducklin for a candid conversation about securing the floating infrastructure that powers global trade and national defense.</p>

<p>As ships evolve into cloud-connected data centers and autonomous vessels redefine modern naval operations, the cyber stakes couldn’t be higher. From GPS spoofing and AIS jamming to real-world crane system takeovers and confiscated narco-subs, Duncan shares what hackers—and defenders—will encounter at this year’s Maritime Hacking Village at DEF CON 33.</p>

<p>Together, Joe and Duncan explore:</p>

<ul><li>Why maritime infrastructure is the “last dinosaur” of digital transformation</li><li>The risks of legacy software in mission-critical systems</li><li>How offensive security is driving rapid discovery and remediation</li><li>Why hiding vulnerabilities only benefits your adversaries</li></ul>

<p>Whether you're building autonomous surface vessels, managing port logistics, or leading security strategy for a defense program, this episode offers an inside look at how to navigate maritime cybersecurity before attackers set the course.</p>]]>
  </description>
  <itunes:title>Hiding Vulns Sinks All Ships</itunes:title>
  <title>Hiding Vulns Sinks All Ships</title>

    <enclosure length="28820675" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/cff1b543-3ccd-4b0b-a3d8-60dc2d7b47a2.mp3" />
  <itunes:duration>00:30:01</itunes:duration>
    <guid isPermaLink="false">cff1b543-3ccd-4b0b-a3d8-60dc2d7b47a2</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>14</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/Hc6j8bquLzqhOhA6WtDFj1fZl22RZsVOBHW-7spFhw8/resize:fill:1500:1500/plain/artwork/96906e08-70da-4d40-a83a-589f8dc6d9f0/exploited-the-cyber-truth/hiding-vulns-sink-all-ships-1753365795.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/hiding-vulns-sink-all-ships</link>
    <pubDate>Thu, 17 Jul 2025 14:45:45 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, RunSafe Security CEO Joe Saunders joins Leslie Grandy, Lead Executive in Residence at the University of Washington, for an insightful conversation about how creative resilience is reshaping cybersecurity in the age of AI.</p>

<p>From philosophical strategies like “Premeditation of Evils” to inversion thinking and paradoxical reasoning, Leslie shares how blending creativity with technical precision can help organizations better anticipate and prepare for evolving cyber threats. Joe and Leslie also explore the double-edged nature of generative AI—how it can serve both attackers and defenders—and why companies must embrace human-centered frameworks alongside technical tools.</p>

<p>Together, they examine the risks of expert bias, the pitfalls of over-automating with AI, and how to design cybersecurity strategies that prioritize adaptability, foresight, and Secure by Design principles.</p>

<p><b>Topics covered:</b></p>

<ul><li>The role of creative thinking in modern cybersecurity</li><li>Inversion thinking as a planning tool for resilience</li><li>How attackers—and defenders—are using generative AI</li><li>Why AI can’t replace human judgment in risk strategy</li><li>The critical need for Secure by Design software development</li></ul>

<p>Whether you’re building products, leading a team, or defining security policies, this episode offers a fresh, actionable perspective on how to stay ahead of both known and unknown threats.</p>]]>
  </description>
  <itunes:title>Creative Resilience in Cybersecurity &amp; AI: A Conversation with Joe Saunders and Leslie Grandy</itunes:title>
  <title>Creative Resilience in Cybersecurity &amp; AI: A Conversation with Joe Saunders and Leslie Grandy</title>

    <enclosure length="33444946" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/4fd4b563-5016-4382-a854-3c65da4af991.mp3" />
  <itunes:duration>00:34:50</itunes:duration>
    <guid isPermaLink="false">4fd4b563-5016-4382-a854-3c65da4af991</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>13</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/7Q1r1bU4Xrm9tB1sQxymaE8hb9LVu6X6FoYRbbNlzjw/resize:fill:1500:1500/plain/artwork/e1b25ac1-1b3e-442c-b394-739f8446865c/exploited-the-cyber-truth/creative-resilience-in-cybersecurity-ai-a-conversation-with-joe-saunders-and-leslie-grandy-1753365892.jpg" />
      <link>https://runsafesecurity.com/podcast/creative-resilience-cybersecurity-ai/</link>
    <pubDate>Thu, 10 Jul 2025 14:08:53 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by Patrick Garrity, Security Researcher at VulnCheck, and RunSafe Security CEO Joe Saunders for a deep dive into the hidden lifecycle of vulnerabilities—and why many threats are exploited long before public disclosure.</p>

<p>As embedded systems grow more complex, attackers are moving faster, exploiting flaws before most organizations even know they exist. Patrick shares research on how frequently vulnerabilities are weaponized prior to disclosure and what that means for defenders across critical infrastructure, OT environments, and embedded technologies.</p>

<p>Together, the group explores how hidden software dependencies, insufficient supply chain visibility, and outdated components create long-term blind spots for security teams. They also discuss actionable strategies, from Software Bills of Materials (SBOMs) to proactive disclosure, that help organizations build more resilient systems.</p>

<p>Topics covered:</p>

<ul><li>Why exploitation often occurs before vulnerabilities are publicly disclosed</li><li>The hidden risks in embedded systems and opaque supply chains</li><li>How SBOMs and build-time visibility can help mitigate inherited risk</li><li>The importance of security maturity in long-lifecycle product environments</li><li>What organizations can do today to reduce risk and increase resilience</li></ul>

<p>Whether you're in cybersecurity, product development, or managing legacy infrastructure, this episode will reshape how you think about vulnerability intelligence and embedded system security.</p>]]>
  </description>
  <itunes:title>Weaponized Before Disclosure: Rethinking Vulnerability Intelligence for Embedded Systems</itunes:title>
  <title>Weaponized Before Disclosure: Rethinking Vulnerability Intelligence for Embedded Systems</title>

    <enclosure length="28657627" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/5d8aa60e-d078-40be-b1df-8ea9109f406c.mp3" />
  <itunes:duration>00:29:51</itunes:duration>
    <guid isPermaLink="false">5d8aa60e-d078-40be-b1df-8ea9109f406c</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>12</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/F6c7Tmt3uHCblgwnFYgEHVjNXjzMwaxhEK55yQ3sfD4/resize:fill:1500:1500/plain/artwork/243fc5f4-039e-4b55-b0ef-3c8c1734567f/exploited-the-cyber-truth/weaponized-before-disclosure-rethinking-vulnerability-intelligence-for-embedded-systems-1753365910.jpg" />
      <link>https://runsafesecurity.com/podcast/weaponized-before-disclosure/</link>
    <pubDate>Thu, 26 Jun 2025 13:11:06 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin sits down with RunSafe Security Founder and CEO Joe Saunders to explore the urgent and evolving risks facing medical devices in healthcare. Based on <a href="https://runsafesecurity.com/whitepaper/medical-device-index-2025/" target="_blank">RunSafe’s 2025 Medical Device Cybersecurity Index</a>—an extensive survey of over 600 healthcare leaders across the U.S., UK, and Germany—they unpack how cyberattacks are no longer limited to hospital IT networks but are now directly compromising connected medical devices, threatening patient care in real time.</p>

<p>From real-world consequences like forced patient transfers and increased downtime, to the rising willingness of healthcare organizations to pay premiums for secure devices, this conversation reveals how cybersecurity is reshaping healthcare operations and procurement strategies. Joe explains why securing medical devices requires a fundamentally different approach than traditional IT, the growing intersection of IT and operational technology (OT) risks, and why regulatory standards are more critical than ever for patient safety.</p>

<p><b>Topics covered:</b></p>

<ul><li>Real impacts of cyberattacks on medical devices and patient care</li><li>Why 46% of healthcare organizations have declined to buy devices lacking strong security</li><li>The unique challenges of securing medical devices versus traditional IT systems</li><li>The convergence of IT and OT security risks in healthcare environments</li><li>The rising importance of Software Bills of Materials (SBOMs) in medical device procurement</li><li>Advice for device manufacturers adapting to a security-first healthcare market</li></ul>

<p>If you’re involved in healthcare, medical device manufacturing, or cybersecurity, this episode offers vital insights into the new front lines of protecting patient care in a connected world.</p>]]>
  </description>
  <itunes:title>Hacking Healthcare: What the Latest Data Tells Us About Medical Device Security</itunes:title>
  <title>Hacking Healthcare: What the Latest Data Tells Us About Medical Device Security</title>

    <enclosure length="28940219" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/d9c2e882-f9e7-48e8-a471-4a40ab89b65c.mp3" />
  <itunes:duration>00:30:08</itunes:duration>
    <guid isPermaLink="false">d9c2e882-f9e7-48e8-a471-4a40ab89b65c</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>11</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/zgKZp9KYBo3UEP6WRwUbZ1wlnj99zDw9MygVGX94t9M/resize:fill:1500:1500/plain/artwork/6fe290c3-02ce-45c3-82be-dbbe73f4cb76/exploited-the-cyber-truth/hacking-healthcare-what-the-latest-data-tells-us-about-medical-device-security-1753365934.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/hacking-healthcare-what-the-latest-data-tells-us-about-medical-device-security</link>
    <pubDate>Thu, 19 Jun 2025 14:08:16 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin is joined by Ocean Aero’s Michael “Sparky” Braun and RunSafe Security Founder and CEO Joe Saunders for a deep dive into the vulnerabilities and opportunities in autonomous maritime defense.</p>

<p>As navies deploy autonomous vehicles on—and below—the water’s surface, this conversation explores the overlooked cybersecurity risks that threaten their resilience and effectiveness. Sparky shares Ocean Aero’s vision for solar- and wind-powered autonomous vessels capable of weeks-long missions while Joe breaks down the need for embedded security to ensure these systems can operate safely in contested environments.</p>

<p><b>Topics covered:</b></p>

<ul><li>How autonomous maritime vehicles reshape modern defense strategy</li><li>Interoperability challenges and the need for Secure by Design systems</li><li>Why nations like South Korea are shifting from traditional assets to autonomous fleets</li><li>Risks posed by supply chain vulnerabilities and insecure software components</li></ul>

<p>Whether you're in defense, critical infrastructure, or cybersecurity, this is a must-listen discussion on protecting mission-critical systems in an increasingly connected battlespace.</p>]]>
  </description>
  <itunes:title>From Seafloor to Stratosphere: Protecting Networked Maritime Defense Systems</itunes:title>
  <title>From Seafloor to Stratosphere: Protecting Networked Maritime Defense Systems</title>

    <enclosure length="26686580" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/d2222176-4531-427a-ac6e-de8f0b8b1e8f.mp3" />
  <itunes:duration>00:27:47</itunes:duration>
    <guid isPermaLink="false">d2222176-4531-427a-ac6e-de8f0b8b1e8f</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>10</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/u6oCjdPIpr7ymDnsah-hZp_6r-v5__RZ2ViVbhR1Plw/resize:fill:1500:1500/plain/artwork/2f3d2f64-6af2-440c-b2f8-011237f74ecd/exploited-the-cyber-truth/from-seafloor-to-stratosphere-protecting-networked-maritime-defense-systems-1753365953.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/from-seafloor-to-stratosphere-protecting-networked-maritime-defense-systems</link>
    <pubDate>Thu, 12 Jun 2025 10:30:00 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin tackles a core challenge in healthcare cybersecurity: how can medical device manufacturers and healthcare organizations secure legacy systems and meet FDA expectations—without rewriting a single line of code?</p>

<p>Guests Phil Englert, VP of Medical Device Security at Health-ISAC, and Joe Saunders, CEO of RunSafe Security, bring decades of experience to a candid discussion on what practical, compliance-ready security looks like when device updates or patches aren’t an option.</p>

<p>They explore how to protect long-life medical devices with limited support, how to interpret and align with evolving FDA premarket and postmarket guidance, and how tools like SBOMs are reshaping transparency and accountability in the healthcare ecosystem. The conversation emphasizes the shared responsibility between manufacturers and providers to prioritize both cybersecurity and patient safety.</p>

<p><b>In this episode:</b></p>

<ul><li>What “security without code changes” really means in healthcare</li><li>Why legacy medical devices are difficult to secure—and what still can be done</li><li>The importance of SBOMs for transparency and visibility</li><li>How evolving FDA expectations are influencing both manufacturers and providers</li><li>Why cybersecurity and patient safety must now go hand in hand</li></ul>

<p>If you're navigating regulatory demands or simply trying to protect vulnerable medical systems, this episode offers grounded insights and real-world strategies.</p>]]>
  </description>
  <itunes:title>Security Without Code Changes: A Path Forward for FDA Compliance</itunes:title>
  <title>Security Without Code Changes: A Path Forward for FDA Compliance</title>

    <enclosure length="29325980" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/7ed8c684-31ed-4cd6-8a1d-0db73e0ca58c.mp3" />
  <itunes:duration>00:30:32</itunes:duration>
    <guid isPermaLink="false">7ed8c684-31ed-4cd6-8a1d-0db73e0ca58c</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>9</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/Er4pZzb6yASpWlsDTYub5f_21DzWlMBdvNbbdYYzAY0/resize:fill:1500:1500/plain/artwork/4889a3c6-b559-4b8f-9f5b-9db0aad06e7c/exploited-the-cyber-truth/security-without-code-changes-a-path-forward-for-fda-compliance-1753365973.jpg" />
      <link>https://runsafesecurity.com/podcast/secure-legacy-medical-devices/</link>
    <pubDate>Thu, 05 Jun 2025 14:26:44 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, RunSafe Security Founder and CEO Joseph M. Saunders returns to explore one of the most urgent challenges in modern transportation: securing the software-defined vehicle.</p>

<p>As connected cars grow more complex—with over 100 million lines of code and dozens of software components—they also become more vulnerable. Joe joins host Paul Ducklin to unpack how Secure by Design principles can help OEMs and suppliers address these risks before they hit the road.</p>

<p>We dive into why memory safety is foundational for protecting embedded systems like ECUs and infotainment units, and how the CAN bus and real-time operating systems factor into broader security decisions. Joe also explains how industry frameworks like ISO 26262 and ASIL (Automotive Safety Integrity Level) classifications help automotive teams align cybersecurity with functional safety goals.</p>

<p>If you're working on embedded systems, vehicle software, or supply chain security in the automotive world, this episode breaks down what it really takes to build safe, secure, and resilient vehicles—right from the start.</p>

<p><b>In this episode:</b></p>

<ul><li>Why vehicles have become such attractive cyber targets—and how criminals are exploiting remote attack vectors</li><li>What “Secure by Design” really means for ECUs, infotainment systems, and embedded firmware</li><li>How to manage software risk across global, multi-tier automotive supply chains</li><li>Why memory safety is key to preventing attacks before they happen</li><li>How ASIL safety levels guide critical system design and compliance</li><li>The role of SBOMs, OTA updates, and RTOS security in future-proofing connected cars</li><li>What a “shift left” approach actually looks like for automotive cybersecurity teams</li></ul>

<p>If you’re building or securing the next generation of connected vehicles, this episode delivers critical insights on embedding cybersecurity into the foundation—not the finish line—of automotive innovation.</p>]]>
  </description>
  <itunes:title>Shifting Cybersecurity Left in Automotive: How Secure by Design Enables Compliance and Safety</itunes:title>
  <title>Shifting Cybersecurity Left in Automotive: How Secure by Design Enables Compliance and Safety</title>

    <enclosure length="24169593" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/7afcaff2-ddcb-4ade-90cb-fe2dbf664345.mp3" />
  <itunes:duration>00:25:10</itunes:duration>
    <guid isPermaLink="false">7afcaff2-ddcb-4ade-90cb-fe2dbf664345</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>8</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/zyXKTkzW-7-f99f7slZ2cqzWbonmjeLzN4ZNYwIP_UU/resize:fill:1500:1500/plain/artwork/f8d2f1cf-9941-4e54-8a0b-89086ebbc085/exploited-the-cyber-truth/shifting-cybersecurity-left-in-automotive-how-secure-by-design-enables-compliance-and-safety-1753365988.jpg" />
      <link>https://runsafesecurity.com/podcast/secure-by-design-automotive-cybersecurity/</link>
    <pubDate>Thu, 29 May 2025 14:04:49 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin dives into one of cybersecurity’s most persistent questions: Can companies actually get ahead of zero-day vulnerabilities—or are we all just chasing shadows?</p>

<p>Joining the conversation are Steve Barriault, VP of Sales &amp; Solutions Engineering North America, Japan and Korea at TrustInSoft, and Joe Saunders, Founder and CEO of RunSafe Security. Together, they bring two distinct but complementary strategies to the table: code-level certainty and runtime protection.</p>

<p>Steve outlines how formal methods and mathematical analysis—long used in safety-critical sectors like avionics—can reduce exploitable bugs to near-zero before code ever ships. Joe shares how runtime defenses like memory layout randomization offer critical safeguards for systems that can’t be patched, such as those in legacy infrastructure.</p>

<p>We explore the growing complexity of the software supply chain, why embedded devices pose a uniquely difficult challenge, and how new regulations are forcing companies to think differently about software assurance and liability.</p>

<p>In this episode:</p>

<ul><li>Why zero days remain so hard to prevent and detect</li><li>How formal verification can help eliminate vulnerabilities</li><li>What makes embedded systems especially vulnerable to zero-day exploitation</li><li>When patching isn’t possible, what protection strategies still work</li><li>How upcoming regulations like the EU Cyber Resilience Act are changing the game</li><li>What a multi-layered defense actually looks like in practice</li></ul>

<p>Whether you're a CISO, security engineer, or software leader, this episode offers a frank look at what it <i>really</i> takes to stay ahead of invisible threats.</p>]]>
  </description>
  <itunes:title>Can Companies Actually Get Ahead of Zero Days? Skeptics Talk</itunes:title>
  <title>Can Companies Actually Get Ahead of Zero Days? Skeptics Talk</title>

    <enclosure length="29532433" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/bf5af5dc-6be8-40d6-9b27-1b5b5699c151.mp3" />
  <itunes:duration>00:30:45</itunes:duration>
    <guid isPermaLink="false">bf5af5dc-6be8-40d6-9b27-1b5b5699c151</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>7</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/z4GjaDgp01zagS_ZFnzol4EKkAkul7tG0Pkz7uyqWzc/resize:fill:1500:1500/plain/artwork/678c0566-d0bc-4d53-be26-734d7e486186/exploited-the-cyber-truth/can-companies-actually-get-ahead-of-zero-days-skeptics-talk-1753366005.jpg" />
      <link>https://runsafesecurity.com/podcast/getting-ahead-of-zero-days/</link>
    <pubDate>Thu, 22 May 2025 15:15:22 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, RunSafe Security Founder and CEO Joe Saunders joins host Paul Ducklin to uncover one of the most overlooked threats in critical infrastructure: embedded risk.</p>

<p>As industrial systems become more automated and interconnected, embedded devices—once isolated—have become prime targets for attackers. Joe explains why embedded risk differs fundamentally from traditional IT threats, and why legacy systems, unmanaged endpoints, and obscure firmware pose some of the biggest risks to operational technology today.</p>

<p>We explore what makes embedded vulnerabilities so hard to find and fix, how real-time operating systems factor into security decisions, and why patching isn’t always an option in industrial settings. Joe also shares how Secure by Design, SBOMs, and exploit prevention strategies can help CISOs break free from the endless patch cycle and proactively reduce risk.</p>

<p><b>In this episode:</b></p>

<ul><li>What “embedded risk” really means for industrial environments</li><li>Why legacy devices are so difficult—and dangerous—to secure</li><li>How to rethink security when patching isn’t possible</li><li>The real role of SBOMs in managing software supply chain risk</li><li>Why real-time operating systems demand a different security mindset</li><li>What every CISO should prioritize to protect safety and uptime</li></ul>

<p>If you’re responsible for securing factory floors, OT networks, or embedded systems—this is a must-listen conversation.</p>]]>
  </description>
  <itunes:title>What Every Industrial CISO Needs to Know About Embedded Risk</itunes:title>
  <title>What Every Industrial CISO Needs to Know About Embedded Risk</title>

    <enclosure length="29636936" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/546df62a-549b-40e3-983e-6116bb5ce16a.mp3" />
  <itunes:duration>00:30:52</itunes:duration>
    <guid isPermaLink="false">546df62a-549b-40e3-983e-6116bb5ce16a</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>6</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/ldvPAjtHEQwjdZGRsZJt0Rye7XxrMnV14XshZwAZX_s/resize:fill:1500:1500/plain/artwork/e9ebf48f-93ed-4ffa-a014-693708199ed2/exploited-the-cyber-truth/what-every-industrial-ciso-needs-to-know-about-embedded-risk-1753366023.jpg" />
      <link>https://pod.co/exploited-the-cyber-truth/what-every-industrial-ciso-needs-to-know-about-embedded-risk</link>
    <pubDate>Thu, 15 May 2025 11:30:12 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, RunSafe Security Founder and CEO Joseph M. Saunders returns to confront a critical question: With nearly 70% of industrial firms hit by OT cyberattacks last year, can we actually fix OT security—or are we forever stuck in a cycle of reaction?</p>

<p>Joe takes a hard look at the current state of operational technology security, exposing why legacy systems running our power grids, water plants, and factories remain dangerously vulnerable. He also unpacks the NSA’s April 2025 guidance on Smart Controller Security and what it signals for the future of critical infrastructure protection.</p>

<p>We discuss the real risks behind outdated architectures, the shortcomings of so-called “security solutions,” and why Secure by Design must replace “patch and pray.” With a focus on practical defense strategies—not buzzwords—Joe shares what CISOs can do right now, even on limited budgets, to mitigate OT risk.</p>

<p><b>In this episode:</b></p>

<ul><li>Why OT environments are still so vulnerable</li><li>The impact of new NSA guidance on Smart Controller Security</li><li>What “Secure by Design” actually looks like in OT systems</li><li>How to cut through “security theater” and address real risks</li><li>What every mid-sized industrial org should prioritize today</li><li>Whether a wake-up call OT event is looming—or already here</li></ul>

<p>If you're responsible for securing critical infrastructure—or simply rely on it—this is a conversation you can’t afford to miss.</p>]]>
  </description>
  <itunes:title>Can We Fix OT Security?</itunes:title>
  <title>Can We Fix OT Security?</title>

    <enclosure length="29571280" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/8b98171d-34af-4746-9d2d-0b66b54c642b.mp3" />
  <itunes:duration>00:30:48</itunes:duration>
    <guid isPermaLink="false">8b98171d-34af-4746-9d2d-0b66b54c642b</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>5</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/dg_mO8BcpcITX_WWQvfAg7KA6bxZa1xi8LTtB9CrEwk/resize:fill:1500:1500/plain/artwork/e16247f3-c068-4ec6-933f-8cc11fae8e01/exploited-the-cyber-truth/can-we-fix-ot-security-1753366039.jpg" />
      <link>https://runsafesecurity.com/podcast/fixing-ot-security/</link>
    <pubDate>Thu, 08 May 2025 14:39:04 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin sits down with RunSafe Security CEO Joseph M. Saunders to unpack the EU Cyber Resilience Act (CRA)—a sweeping new regulation set to reshape software security across Europe and beyond.</p>

<p>With enforcement on the horizon in 2026, Joe breaks down what the CRA means for manufacturers, developers, and supply chain partners today. From the critical role of Software Bill of Materials (SBOMs) to the shifting landscape of liability, we explore how the CRA is raising the bar for Secure by Design software.</p>

<p>Joe also shares how leading organizations are preparing now and why cyber insurance may play a bigger role in the CRA era, even when best practices are followed.</p>

<p><b>In this episode:</b></p>

<ul><li>What the CRA covers and who it affects</li><li>Why SBOMs are central to compliance and trust</li><li>How the law shifts liability for software flaws</li><li>Real-world prep strategies from industry leaders</li><li>The role of cyber insurance in a post-CRA world</li></ul>

<p>If your business touches software, this is one regulation you can’t afford to ignore.</p>]]>
  </description>
  <itunes:title>The EU Cyber Resilience Act (CRA) Exposed</itunes:title>
  <title>The EU Cyber Resilience Act (CRA) Exposed</title>

    <enclosure length="29663661" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/4972107d-0514-44b4-91b9-268f2f1f49af.mp3" />
  <itunes:duration>00:30:53</itunes:duration>
    <guid isPermaLink="false">4972107d-0514-44b4-91b9-268f2f1f49af</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>4</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/2UFsZPv92Xm9bohjTELvEDJ9d5PLVxZIYJdOlf1pUiM/resize:fill:1500:1500/plain/artwork/3fa18b52-c1b7-4ecb-ac5f-c8b7eca8bc9d/exploited-the-cyber-truth/the-eu-cyber-resilience-act-cra-exposed-1753366054.jpg" />
      <link>https://runsafesecurity.com/podcast/eu-cyber-resilience-act/</link>
    <pubDate>Thu, 01 May 2025 14:47:36 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of <i>Exploited: The Cyber Truth</i>, host Paul Ducklin sits down with Joe Saunders, Founder &amp; CEO of RunSafe Security, to unpack the real meaning behind “Secure by Design”—and why it’s more than just the latest industry buzzword. As cyber threats escalate in scale and sophistication, building security into software from the start has become not only best practice but a national imperative.</p>

<p>Joe shares why RunSafe signed CISA’s Secure by Design pledge and the bold steps the company is taking to meet its goals, including a transition from C++ to Rust to eliminate entire classes of memory safety vulnerabilities. He also explains how organizations can implement Secure by Design principles—without overhauling their entire codebase—using techniques like runtime exploit prevention.</p>

<p><b>In this episode:</b></p>

<ul><li>Why “Secure by Design” is the future of software development</li><li>What the CISA pledge means—and why RunSafe joined it</li><li>How transitioning to Rust addresses deep-rooted memory safety issues</li><li>Practical ways to harden existing systems without starting from scratch</li><li>How Secure by Design supports national security and critical infrastructure protection</li></ul>]]>
  </description>
  <itunes:title>Secure by Design: Why It’s More Than Another Buzzword</itunes:title>
  <title>Secure by Design: Why It’s More Than Another Buzzword</title>

    <enclosure length="31125285" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/b722b03a-82ca-4aca-a434-e893a1f74f52.mp3" />
  <itunes:duration>00:32:25</itunes:duration>
    <guid isPermaLink="false">b722b03a-82ca-4aca-a434-e893a1f74f52</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>3</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/xW7ARDuKWfEmMm8gzpLzDn2MTR9tr1_ByrLqZJAbwjg/resize:fill:1500:1500/plain/artwork/518e35d9-54e9-4fd3-8624-c7b89aaf649a/exploited-the-cyber-truth/secure-by-design-why-its-more-than-another-buzzword-1753366071.jpg" />
      <link>https://runsafesecurity.com/podcast/secure-by-design/</link>
    <pubDate>Thu, 24 Apr 2025 14:19:32 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In this episode of “Exploited: The Cyber Truth,” host Paul Ducklin returns with <a href="https://runsafesecurity.com/blog/team/joe-saunders/" target="_blank">Joe Saunders</a>, CEO and Founder of RunSafe Security, to dissect the alarming Salt Typhoon campaign that infiltrated major telecommunications companies across the United States and beyond. This Chinese state-sponsored group has been quietly harvesting sensitive communications data for at least two years, including potentially accessing conversations of high-profile political figures.</p>

<p>Joe explains how Salt Typhoon represents China’s long-term strategic approach to cyber espionage—playing the long game with well-funded teams operating globally. The discussion explores how attackers exploited vulnerabilities in Cisco routers to create their own backdoor access, compromising hundreds of thousands of devices simultaneously.</p>

<p>In this episode:</p>

<ul><li>How Salt Typhoon cleverly subverted “lawful intercept” infrastructure designed for legitimate government surveillance, turning it against its creators</li><li>Why fileless malware like the “Demodex” rootkit makes detection nearly impossible by operating only in memory</li><li>The surprising connection between video game cheating software and nation-state hacking tools</li><li>Why metadata collection is a powerful intelligence tool, revealing critical patterns even without accessing conversation content</li><li>Practical approaches to defense-in-depth security and the importance of memory safety in preventing these sophisticated attacks</li><li>The need for systematic approaches to security rather than just patching individual vulnerabilities after discovery</li></ul>]]>
  </description>
  <itunes:title>U.S. Telecoms Under Fire: Implications of the Salt Typhoon Campaign</itunes:title>
  <title>U.S. Telecoms Under Fire: Implications of the Salt Typhoon Campaign</title>

    <enclosure length="25651702" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/67499cd3-c2cf-4072-9904-ba2a8a3605b1.mp3" />
  <itunes:duration>00:26:43</itunes:duration>
    <guid isPermaLink="false">67499cd3-c2cf-4072-9904-ba2a8a3605b1</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>2</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/q3w-r85J5mrzSQwDdEUYM7bfQodJMyxx68RPGYMsrBM/resize:fill:1500:1500/plain/artwork/8c80c5f3-34e7-4a2a-8cc1-2282036c4513/exploited-the-cyber-truth/u-s-telecoms-under-fire-implications-of-the-salt-typhoon-campaign-1753366088.jpg" />
      <link>https://runsafesecurity.com/podcast/salt-typhoon-us-telecom-breach/</link>
    <pubDate>Thu, 17 Apr 2025 14:28:23 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>In the debut episode of “Exploited: The Cyber Truth,” host Paul Ducklin talks with Joseph M. Saunders, CEO and Founder of RunSafe Security, about the serious threat Volt Typhoon poses to critical infrastructure in the U.S. and beyond. What makes this Chinese state-sponsored group so dangerous, and how are they exploiting the software in devices that make our world run?</p>

<p>Joe breaks it all down, explaining the big-picture geopolitical motivations behind these attacks. You’ll also learn how attackers use memory-based vulnerabilities to quietly gain long-term access to critical systems without leaving obvious clues.</p>

<p>In this episode:</p>

<ul><li>How Volt Typhoon is targeting critical infrastructure in sectors like transportation, communications, and financial services to create potential footholds for future conflicts</li><li>Why memory-based vulnerabilities are a major risk, enabling attacks that are hard to detect and trace</li><li>Practical ways to secure systems—like rewriting code in memory-safe languages or using advanced memory protection techniques like load-time function randomization</li><li>How Secure by Design and Secure by Demand initiatives can drive adoption of practices to improve cybersecurity in critical infrastructure</li></ul>]]>
  </description>
  <itunes:title>Volt Typhoon and the Risk to Critical Infrastructure</itunes:title>
  <title>Volt Typhoon and the Risk to Critical Infrastructure</title>

    <enclosure length="29523243" type="audio/mpeg" url="https://downloads.pod.co/f4194d1c-08a8-450d-bf66-4ec902a58b8a/cda10b2b-130e-41b9-9c71-d0c39be2e52c.mp3" />
  <itunes:duration>00:30:45</itunes:duration>
    <guid isPermaLink="false">cda10b2b-130e-41b9-9c71-d0c39be2e52c</guid>
  <itunes:author>RunSafe Security</itunes:author>
    <itunes:episode>1</itunes:episode>
      <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/Q3G8H4jpNw2H5zhCoECVe1cS1t9hmkiVdwb95fzcDiE/resize:fill:1500:1500/plain/artwork/e6e614b9-1edb-4276-8582-ab2fcb325684/exploited-the-cyber-truth/volt-typhoon-and-the-risk-to-critical-infrastructure-1753366106.jpg" />
      <link>https://runsafesecurity.com/podcast/volt-typhoon-critical-infrastructure/</link>
    <pubDate>Wed, 09 Apr 2025 19:34:54 +0000</pubDate>
</item>
      </channel>
</rss>
