Readhook Zero-Day Simulator (Video)
Readhook Zero-Day Simulator
This video demonstrates the functionality of Readhook, Polyverse's zero-day simulator tool.
Understanding Spectre: Part 1 (Video)
Understanding Spectre: Part 1
Morgan Hein describes in detail what the Spectre vulnerability is, how it works and why its effective against every chip made in the last two decades.
Understanding Spectre: Part 1 (Video)
Moving-Target Defense
Instead of focusing on building prevention and failing at doing so, the security industry is starting to embrace the notion of cyber resiliency. A resilient system is one where breach is assumed, but has defenses designed such that the system can continue to operate safely and reliably.
Polyverse Product Brief (Whitepaper)
Polyverse Product Brief
Polyverse Polymorphic Linux uses Moving Target Defense to strategically randomize memory layouts of the target application to stop memory exploitation attacks. With Polyverse, crafted exploits targeting a specific memory vulnerability simply will not work, even when the application is left unpatched.
What Startups Should Know about Securty (Video)
What Startups Should Know about Securty
Archis Gore goes over methods to effectively create lightweight concrete execution plans that have a finite cost, are realistic, provide a tangible measurable benefit, are cheap if not outright free, and cover your bases with customers, investors, and regulators.
How does Polymorphic Linux Work? (Video)
How does Polymorphic Linux Work?
Kiley Williams goes from explaining how to craft a memory-based attack, into how to thwart it, and what a real-world application of Polymorphic Linux looks like.
Do you really get memory based exploits? (Video)
Do you really get memory based exploits?
Morgan Hein discusses a new Open Source tool, EnVisen, which lets you view the exported symbols and ROP gadget surface area of your binaries in a visually-rich and purposeful way. All from directly within your browser.
Principles of Agile Security (Manifesto)
Principles of Agile Security
Agile Security seeks to create software that is fundamentally resilient to cyberattacks yet practical and easy to implement. These seven principles are guideposts to implementing agile security for software systems, from Internet of Things to cloud applications.
Case Study
ISACA Polyverse Case Study (Case Study)
ISACA Polyverse Case Study
In this study, the attackers directly attacked the live, production website for Polyverse Corporation. The study conclusively demonstrated the resiliency of Polyverse’s Moving Target Defense technology against web-application and remote-code exploit attacks.

Stop Zero-day attacks in minutes!