Readhook Zero-Day Simulator
This video demonstrates the functionality of Readhook, Polyverse's zero-day simulator tool.
Understanding Spectre: Part 1
Morgan Hein describes in detail what the Spectre vulnerability is, how it works and why its effective against every chip made in the last two decades.
Instead of focusing on building prevention and failing at doing so, the security industry is starting to embrace the notion of cyber resiliency. A resilient system is one where breach is assumed, but has defenses designed such that the system can continue to operate safely and reliably.
Polyverse Product Brief
Polyverse Polymorphic Linux uses Moving Target Defense to strategically randomize memory layouts of the target application to stop memory exploitation attacks. With Polyverse, crafted exploits targeting a specific memory vulnerability simply will not work, even when the application is left unpatched.
What Startups Should Know about Securty
Archis Gore goes over methods to effectively create lightweight concrete execution plans that have a finite cost, are realistic, provide a tangible measurable benefit, are cheap if not outright free, and cover your bases with customers, investors, and regulators.
Do you really get memory based exploits?
Morgan Hein discusses a new Open Source tool, EnVisen, which lets you view the exported symbols and ROP gadget surface area of your binaries in a visually-rich and purposeful way. All from directly within your browser.
Principles of Agile Security
Agile Security seeks to create software that is fundamentally resilient to cyberattacks yet practical and easy to implement. These seven principles are guideposts to implementing agile security for software systems, from Internet of Things to cloud applications.