The post Beyond the Battlefield: How Generative AI Is Transforming Defense Readiness appeared first on RunSafe Security.
]]>In a recent episode of Exploited: The Cyber Truth, RunSafe Security CEO Joseph M. Saunders and Ask Sage’s Arthur Reyenger joined host Paul Ducklin to discuss how AI is transforming mission readiness. But instead of focusing on sci-fi scenarios, their conversation looked at the ways AI is supporting behind the scenes.
For decades, defense teams have struggled under the weight of processes, documentation, testing requirements, and the sheer volume of data needed to support modern missions. Whether you’re analyzing electromagnetic spectrum threats, vetting new technology, or validating weapons systems, the bottleneck is almost always the same: time.
That’s exactly where generative AI is already having an outsized impact.
Organizations are using AI to speed up tasks that previously slowed entire programs—think requirements gathering, testing cycles, red-team scenario planning, and acquisition paperwork. Reyenger described one real-world deployment where a combat command used generative AI to evaluate new technologies faster:
“We saved them 95% of the time and the cost to be able to go through those processes.”
That kind of acceleration doesn’t just make workflows cleaner—it moves capability into the field when warfighters actually need it.
If there’s a misconception about AI in defense, it’s that its greatest value lies in autonomous weapons. In reality, AI is transforming less glamorous, but mission-critical areas like code development and sustainment.
Saunders emphasized that AI is already reshaping how embedded systems and defense software are built. Instead of teams getting buried in boilerplate code, AI handles the repeatable pieces, letting engineers focus on architecture, performance, and security. The result is faster innovation and more secure systems.
Another example comes straight from the U.S. Navy. Ships equipped with 3D printers previously had to request schematics and documentation from shore through slow, satellite-connected networks. Now, generative AI models running locally can help crews identify the right parts, understand dependencies, and produce what they need instantly, even while offline.
This is the kind of operational lift that rarely makes headlines but changes everything. Missions recover faster. Readiness improves. Warfighters stay effective in environments where bandwidth, connectivity, and time are scarce.
As the Department of Defense continues to adopt AI, one principle remains non-negotiable: humans stay in the loop. The most powerful applications of generative AI are the ones reducing cognitive load so people can make better decisions.
Reyenger captured this well when discussing how AI fits into modern workflows:
“Technology should not be dictating the way that organizations define their workflows. It should be supporting them. If you’re doing it a certain way, it was because it was right at a time.”
This mindset also extends to the cybersecurity and model-security challenges surrounding AI. Ask Sage’s “fire-and-forget” architecture, for example, ensures sensitive data doesn’t persist inside models—an essential requirement for defense environments where security, privacy, and zero-trust principles are table stakes.
As Saunders emphasized in the episode, the goal isn’t just choosing the best foundation model today. It ensures defense teams aren’t locked into a single vendor or platform, and that AI remains flexible enough to evolve with the mission.
The more generative AI takes on repetitive work—documentation, analysis, testing, search, troubleshooting—the more time experts can spend on creativity, strategy, and judgment. And that’s where warfighters deliver their greatest value.
AI’s impact in defense isn’t about the machines. It’s about freeing people to think, decide, innovate, and act faster and with more confidence.
Listen to the full episode here.
The post Beyond the Battlefield: How Generative AI Is Transforming Defense Readiness appeared first on RunSafe Security.
]]>The post Safety Meets Security: Building Cyber-Resilient Systems for Aerospace and Defense appeared first on RunSafe Security.
]]>In this environment, a software glitch, a failed component, or a cyber intrusion can have the same catastrophic impact: a system that doesn’t behave as intended when lives and missions are on the line.
Patrick Miller, Product Manager at Lynx, has spent his career at the intersection of safety, security, and performance, working across aerospace, defense, enterprise cloud, and embedded systems.
In this Q&A, Patrick shares how architecture, separation, and long-term thinking can help engineers and product teams design resilient weapons systems.
Patrick Miller: The biggest lesson is that every domain taught me something different about risk. Security is as much about governance and auditability as it is about technical controls. In defense and aerospace, I learned that resilience isn’t just about preventing failures, it’s about designing systems that degrade gracefully when something does go wrong.
But the connective tissue across all these domains is, particularly in product management, you must know your customer’s actual need, not just the problem you think you’re solving.
Early in my career, I realized that the “why” behind a security requirement often matters more than the requirement itself.
Patrick: They are not separate priorities but two expressions of the same goal: keep the system doing what it’s supposed to do, when it’s supposed to do it, and in the face of adversity.
Safety asks, “What happens when things might fail?”
Security asks, “What happens when someone tries to make them fail?”
In aerospace, especially, legacy systems were designed in an era when the threat model was simple: physical tampering or insider threat. Now we have connected avionics and software-defined platforms with attack surfaces we didn’t have to think about ten years ago.
A safety failure and a security failure can look identical from the flight deck, and both result in the aircraft not doing what the crew intended. The intersection is in architecture. If you design a system with strong separation, say at the kernel level, between safety-critical functions and everything else, you’re solving for both.
Patrick: A key risk is that a vulnerability in one aircraft or subsystem can theoretically affect an entire fleet. However, this shift also creates the opportunity to build security and resilience from day one, rather than bolting it on afterward.
When the industry is trying to add security to 20-year-old real-time operating systems to modernize embedded platforms for customers, it’s like retrofitting a house with a new foundation. Software-defined systems let you architect with separation, modularity, and defense-in-depth from the start. You can implement zero-trust and cyber-resilience principles in real-time environments in ways you couldn’t with monolithic systems.
Patrick: This is one of the most complex problems in the industry. A crewed aircraft certified today will probably still be flying forty years from now, just as there are crewed aircraft certified forty years ago still flying today. By then, the threat landscape will have evolved dramatically. Cryptographic algorithms considered secure today may be obsolete in a post-quantum world.
The mitigation is architectural resilience. First, design with modularity so that security updates can be applied surgically to vulnerable components without recertifying the entire system. Second, implement strong separation so that compromising one module doesn’t cascade through the entire aircraft. Finally, at the program level, it means thinking about your supply chain and third-party dependencies not as static decisions, but as ongoing risk management.
Patrick: The step-change in the evolution of UAVs flips the traditional paradigm on its head. With a crewed aircraft, safety is paramount because at least one, or more likely, many human lives are at stake. In a contested environment, the calculus is different for a single-use tactical UAV. You might accept a higher technical risk if it means fielding new capabilities faster.
Here’s where I push back on the “disposable” framing: even if the platform is disposable, the capability often isn’t. If an adversary captures and reverse-engineers your UAV, they can gain insights into your tactics, sensors, and comm architecture, which requires constant iteration to stay ahead. So even for “disposable” systems, I think about: What’s worth protecting architecturally?
You can design a UAV that’s tactically expendable but still prevents an adversary from extracting intelligence or spoofing commands.
Patrick: This is where data-driven prioritization really matters. The temptation is always to boil the ocean: add every new security feature, refactor the entire architecture, and implement the latest standards. Instead, measure the opportunity cost of each modernization decision. What are my top three security gaps today? What are my top three performance bottlenecks? Which modernization efforts address both?
Implementing strong separation boundaries improves real-time performance by preventing one task from blocking another, particularly in multi-core processors. At a practical level, invest in your DevSecOps pipeline early and institute automated testing, static analysis, and security scanning to build confidence to modernize faster.
Patrick: “Designing for separation” means treating compartmentalization as a primary architectural concern, not an afterthought. It’s the difference between saying “we’ll secure the perimeter and hope nobody gets through” and saying “someone eventually gets through, here are the north-south and east-west limits that prevent further intrusion, here is how we know the threat actor entered and how to neutralize them.”
In practice, that means defining your trust boundaries early. What functions are safety-critical? What modules are network-connected? What functions are mission-critical but not safety-critical? A separation kernel enforces those boundaries between partitions at the hypervisor level: one partition can’t access another’s memory; one partition can’t interfere with another’s timing. In real-time systems, timing is paramount, so this isolation protects both safety and security simultaneously.
Patrick: The Department of Defense’s Software Fast-Track initiative is pushing contractors to adopt modern DevSecOps practices and accelerate secure software delivery timelines. We’re also watching how NIST 800-53 and 800-171 requirements cascade down through the supply chain, forcing even smaller tier-two and tier-three suppliers to implement rigorous security controls.
The Software Bill of Materials (SBOM) mandate is particularly interesting because it’s forcing manufacturers to have real visibility into their software dependencies, which is foundational for long-term supply chain security.
On the civil aviation side, DO-326a and DO-356 are pushing the industry from a compliance-checkbox approach toward continuous monitoring and threat assessment throughout the aircraft lifecycle. Zero-trust mandates across both defense and critical infrastructure are also driving architectural changes at the platform level, which aligns well with what we’re building at Lynx.
Patrick: It means I can trust the displays and controls to follow my inputs and trust the instruments. It means that if there’s a compromise somewhere in the system or sensor, it fails safely, perhaps with a display warning, but not with an unexpected output from the aircraft. A pilot already has enough mental load as it is and does not want to have to think or worry about cybersecurity while flying.
There’s a saying: “aviate, navigate, communicate.” Built-in resilience means the architects and engineers did their job right so that cybersecurity is invisible to me, a redundancy so the aircraft operates reliably.
Patrick: Know your customer’s actual problem, not just the requirement they gave you. Sometimes the requirement is a proxy for something deeper. Sometimes the customer doesn’t even know how to articulate it yet. For me, that means talking directly with customers, attending industry conferences, asking hard questions, and actively listening.
What’s your threat model today? How are you thinking about long-term sustainability? What architecture decisions are constraining you? Be honest about tradeoffs. You can’t optimize for everything, but if you understand your customer’s actual priorities, you can make product feature choices that strike the right balance.
In aerospace and defense systems, safety and security directly overlap. The same design choices that protect flight safety also determine cyber resilience. Architectural separation, modularity, and supply chain transparency are prerequisites for survivability in the digital battlespace.
RunSafe Security and Lynx have partnered to advance this mission through technical collaboration. The integration of LYNX MOSA.ic and RunSafe Protect delivers the industry’s first DAL-A certifiable, memory-safe RTOS platform, uniting safety, security, and operational efficiency in a single solution.
Read our joint white paper for more on this partnership: Integrating RunSafe Protect with the LYNX MOSA.ic RTOS
The post Safety Meets Security: Building Cyber-Resilient Systems for Aerospace and Defense appeared first on RunSafe Security.
]]>The post The Decade Ahead in Aerospace Cybersecurity: AI, Resilience, and Disposable Weapons Systems appeared first on RunSafe Security.
]]>The aerospace and defense sector is entering a new chapter. With networked systems, distributed architectures, and mission-critical connectivity, cybersecurity is as vital as physical shielding.
In a recent discussion on aerospace cybersecurity strategy, Shane Fry, CTO of RunSafe Security, and Patrick Miller, Product Manager at Lynx, discussed how the next five to ten years will reshape how we defend aerospace assets.
What follows are four key trends that highlight where the industry is headed.
Watch the full webinar for more on aerospace cybersecurity here.
Artificial intelligence is emerging as both a revolutionary tool and a potential liability in aerospace cybersecurity. Shane noted how AI is reshaping nearly every aspect of defense systems, from vulnerability detection to operational optimization.
“There’s a lot of really cool research being done in penetration testing and finding vulnerabilities and using AI to assist operators in security,” he said.
AI is now helping engineers and analysts identify weaknesses faster and automate portions of cyber defense previously handled manually. But as Shane pointed out, the same technology that accelerates innovation can also magnify risks.
“One of the things that is a negative,” he warned, “is many of these new capabilities are trained on software that’s not secure.”
Large language models and AI code-generation tools often learn from open-source repositories riddled with known flaws. That means they might produce software that appears sound but hides vulnerabilities—like memory corruption or buffer overflows—deep within the codebase.
“We’re going to see a rise in software vulnerabilities,” Shane predicted, “as more developers use these code-assistants to produce faster code that looks good but may actually have subtle memory corruption vulnerabilities in them.”
For a sector where software directly underpins mission safety and national defense, that’s a sobering reality. The next phase of AI integration, Shane cautioned, may bring turbulence before it delivers real progress.
“The next six months to a year or two years might be really rough,” he admitted, “but ultimately, the progress will be for the overall good.”
One of the most striking shifts Shane highlighted was the rise of low-cost, “disposable” weapon systems, particularly unmanned aerial vehicles (UAVs). In a time where speed and affordability are driving procurement decisions, these assets are designed to complete their mission, but not necessarily to return.
“When we talk about disposable UAVs,” Shane explained, “there’s a lot of interest in having lower-cost solutions that we don’t care if they survive the mission. We just need them to accomplish the mission.”
That philosophy is reshaping how system owners think about design and risk. Yet, Shane cautioned that the push for cheaper, faster production can come at a dangerous price.
“As we strive to cut as much as we can to bring costs down,” he said, “we’ve got to make sure that we’re still doing enough security, enough safety so that we can accomplish the mission.”
In a world where digital compromise can have physical consequences, even a minor software flaw could be catastrophic. “We don’t want to end up in a situation where a UAV flying overhead has a trivial vulnerability that gets exploited, and the drone turns around and bombs an allied target,” Shane said.
That vivid example underscores a growing tension in modern defense programs: how to balance affordability and agility with assurance and control. The Department of Defense’s efforts to modernize its software approval and certification processes for future readiness will be critical.
A core component of that, Shane noted, is “having good, accurate SBOMs and being able to understand what the risk is in your software that you’re shipping.”
Additionally, this will help ensure that even low-cost or disposable systems can be deployed responsibly.
In short, the aerospace industry is entering an era where scale and security must coexist. Disposable systems may not be built to last, but their cybersecurity must endure long enough to protect the mission, the data, and the allies they serve.
Cyber defense of aerospace is not a solo endeavor. Governments, aerospace primes, and vendors will need to align to defend complex systems.
Shane observed that modern systems integrate legacy code, which is becoming increasingly interconnected, heightening risk. To manage this complexity, the industry is leaning into partnerships and certified deployment paths.
For example, Lynx’s secure hypervisor technology, when paired with RunSafe’s memory protection, delivers a layered, modular architecture that strengthens system isolation and resilience in the field.
When discussing future integration of AI, Patrick noted: “Lynx has taken the approach of enabling those safety-focused or non-critical applications to run alongside, but totally separate from, the safety-critical applications and subjects within that same hardware.”
This collaborative, layered approach is one example of working together to reduce overall risk.
Overarching all of these trends is the principle of resilience. In an environment where AI may introduce new vulnerabilities, collaboration expands the ecosystem, geopolitics raises the stakes, and disposable systems proliferate, aerospace defenders must build platforms that can endure, adapt, and recover.
As Shane explained: “You’re going to get the most out of your hardware and your systems by having a more robust and modular system, with security baked in.”
He continued: “Having a modular system lets you get new software, new features, new capabilities onto your platforms faster.”
Patrick noted that the partnership model between Lynx and RunSafe demonstrates what “defense-in-depth” looks like in practice.
“With the Lynx and RunSafe partnership,” Patrick said, “pairing that with RunSafe’s memory protection, you’re able to remove a whole category of exploits you’d otherwise have to defend against.”
The next decade for aerospace cybersecurity will be defined by convergence between AI and assurance, collaboration and software supply chain transparency, pre-emptive design and agile operations.
Building resilience and adopting safety-focused engineering will enable faster innovation without leaving cybersecurity by the wayside.
For more on RunSafe and Lynx’s work in aerospace cybersecurity, read our white paper on “Integrating RunSafe Protect with the LYNX MOSA.ic RTOS.”
The post The Decade Ahead in Aerospace Cybersecurity: AI, Resilience, and Disposable Weapons Systems appeared first on RunSafe Security.
]]>The post How Aviation Cybersecurity Strategy Became the Industry’s Biggest Blind Spot appeared first on RunSafe Security.
]]>For decades, aviation has operated under a simple but powerful principle: safety first. The industry’s rigorous certification standards have created some of the world’s most reliable systems, with aircraft designed to account for every conceivable mechanical failure, weather condition, and human error.
But that very mindset—safety above all—has created a blind spot. While the aviation industry perfected aviation flight safety, it overlooked an equally urgent priority: cybersecurity. Modern aircraft are hyper-connected flying computers, connected to ground networks, satellite systems, and the internet itself.
In their 2025 report, the Cyberspace Solarium Commission offered a warning. The aviation industry is facing escalating threats from ransomware attacks, GPS spoofing, and sophisticated cyber intrusions.
A new aviation cybersecurity strategy is now mission-critical for protecting passengers, operations, and national security.
The aviation industry relies on DO-178C and similar safety standards, which focus on ensuring that flights land safely despite system failures, hardware malfunctions, or software bugs. These standards have been remarkably successful, as commercial aviation remains one of the safest forms of transportation.
However, these safety protocols were designed for an era when the primary threats were mechanical failures and human error, not malicious attacks. DO-178C accounts for everything that should be on an aircraft, but it doesn’t address threats from sources that shouldn’t be there, like hackers infiltrating flight systems through network connections.
As DO-356, the aviation industry’s newer security standard, explicitly states: “Safety and security are not the same thing; however, there is a strong overlap.” The document acknowledges what many industry professionals are only now realizing: a security breach can quickly become a safety issue. If flight systems are designed with safety in mind, but not security, they are not truly safe. A breach of security will cause a violation of safety.
Recognition of the problem is the first step toward solving it. The Federal Aviation Administration proposed new cybersecurity requirements in August 2024 that would make cyber protection a standard part of airworthiness for newly built airplanes and equipment.
Additionally, one of the recommendations stemming from the CSC report is that “The FAA and TSA should harmonize cybersecurity regulatory requirements for the aviation subsector.” This includes referencing existing NIST frameworks and adding guidelines for supply chain security unique to the needs of the aviation industry.
Compliance with regulations, however, is far from simple and comes at a significant cost, particularly for legacy or long-lived systems. Take the F-35, for example. Its prototype and design work began in the 1990s, well before today’s cybersecurity threats had taken shape. While it incorporates cutting-edge technology, much of its foundational architecture was conceived in a pre-cyber era. These systems must now be retrofitted or augmented to meet security measures within the constraints of rigid defense budgets that often make comprehensive overhauls impossible.
Where should the aviation industry invest its time and dollars? The first step is elevating software security to the same level of importance as flight safety. A July 2024 study by SecurityScorecard, a cybersecurity firm, found that the aviation industry overall scores a “B” on cybersecurity and that aviation-specific software and IT vendors scored the lowest in cybersecurity readiness across industries.
Improving this score requires implementing Software Bills of Materials (SBOMs) to track every software component in aviation systems and prioritizing vulnerability management with the same rigor as mechanical maintenance.
For older systems, runtime code protection technologies can strengthen cybersecurity without requiring full code rewrites, bridging the gap between legacy architecture and modern security standards.
Also on the horizon are security solutions that attain safety of flight certifiability, making security a much easier and obvious piece of highly-regulated aircraft.
Aviation’s cybersecurity blind spot didn’t develop overnight, and isn’t easily resolved. However, the industry’s legendary commitment to safety provides a strong foundation for building equivalent security standards. The same methodical, evidence-based approach that made flying safer than driving can be applied to making it more secure.
The industry that taught the world how to fly safely now has the opportunity to show how to fly securely as well.
Read more about how RunSafe supports an overall aviation cybersecurity strategy in our white paper: “RunSafe Security Safety of Flight Approach.”
The post How Aviation Cybersecurity Strategy Became the Industry’s Biggest Blind Spot appeared first on RunSafe Security.
]]>