Home
News
Tech Grid
Interviews
Anecdotes
Think Stack
Press Releases
Articles
  • Application Security

RunSafe Security Appoints Bob Lyle as Chief Revenue Officer


RunSafe Security Appoints Bob Lyle as Chief Revenue Officer
  • by: Source Logo
  • |
  • January 15, 2026

RunSafe Security, a leading cybersecurity company specializing in embedded software protection, has appointed Bob Lyle as Chief Revenue Officer (CRO). Lyle brings more than 30 years of experience in cybersecurity, software, and high-technology markets. In his new role, he will oversee global sales execution, go-to-market strategy, customer expansion, and strategic partnerships as RunSafe scales its platform for runtime protection and build-time SBOM generation across enterprise, government, and critical infrastructure sectors.

Quick Intel

  • RunSafe Security appoints Bob Lyle as Chief Revenue Officer to drive global revenue growth.
  • Lyle has over 30 years of experience in cybersecurity and software markets.
  • He previously served as CRO at Medcrypt, MergeBase (acquired by Finite State), and Cybeats (led to IPO).
  • Earlier roles include co-founder/CEO of Valona Labs (acquired by HMD Global) and executive positions at Qualcomm, Samsung, Motorola, and Absolute.
  • Lyle chairs the GSMA’s Device Security Group (DSG) since 2019.
  • The appointment aligns with rising demand for RunSafe’s solutions amid growing software supply chain risks.

Seasoned Revenue Leader Joins at Critical Growth Phase

Lyle’s extensive background spans venture-backed startups and large public technology companies. At Cybeats, he contributed to scaling from early customers to a successful initial public offering on the Canadian Securities Exchange. His leadership at Medcrypt and MergeBase focused on revenue acceleration in competitive cybersecurity markets. This experience positions him to guide RunSafe’s expansion as organizations prioritize runtime protection for embedded systems and critical infrastructure.

“I’m excited to join RunSafe at a time when protecting software at runtime is becoming mission-critical,” said Bob Lyle. “RunSafe addresses a foundational cybersecurity challenge for embedded systems, and I look forward to helping expand adoption across industries where reliability and security are paramount.”

Strengthening Leadership for Market Expansion

“Bob brings deep expertise in revenue leadership and cybersecurity markets,” said Joseph M. Saunders, Founder and CEO of RunSafe. “His experience scaling revenue at both startups and global technology companies by focusing on customer needs and requirements makes him a strong addition to our leadership team as we continue to grow our customer base.”

The appointment reflects RunSafe’s momentum in addressing software supply chain vulnerabilities. Demand continues to rise from government agencies, enterprises, and critical infrastructure operators seeking automated vulnerability identification, risk quantification, license compliance, and patented memory relocation techniques that prevent exploitation without code changes or performance impact.

Advancing Embedded Software Security

RunSafe’s platform delivers comprehensive protection from build-time to runtime. Its authoritative SBOM generator for embedded systems and C/C++ projects, combined with automated risk analysis and hardening capabilities, helps organizations defend critical systems against supply chain threats while maintaining reliability and compliance.

This leadership addition strengthens RunSafe’s ability to meet accelerating market needs for secure, resilient embedded software in an era of heightened cyber risks.

About RunSafe Security

RunSafe Security protects embedded software across critical infrastructure, delivering automated vulnerability identification and software hardening from build-time to runtime to defend the software supply chain and critical systems without compromising performance or requiring code rewrites. The RunSafe Security Platform includes the authoritative build-time SBOM generator for embedded systems and C/C++ projects, automated vulnerability identification and risk quantification, license compliance, and patented memory relocation techniques to prevent exploitation even when a patch is not available.

  • CybersecurityEmbedded SecuritySoftware Supply Chain
News Disclaimer
  • Share