How does Polymorphic Linux Work?

Kiley Williams | February 13, 2017

In this webinar, Kiley Williams goes from explaining how to craft a memory-based attack, into how to thwart it, and what a real-world application of Polymorphic Linux looks like.

Do you really get memory based exploits?

Morgan Hein | January 9, 2017

In this webinar, Morgan Hein discusses a new Open Source tool, EnVisen, which lets you view the exported symbols and ROP gadget surface area of your binaries in a visually-rich and purposeful way, from directly within your browser. It can even compare binaries to visualize common attackable surface area and score your zero-day vulnerability risk with built-in entropy evaluation.

Applying Moving Target Defense to Container Environments

Alex Gounares | June 22, 2017

Homogeneity makes static environments an easy target for hackers, who have access to the same software available to developers, be it Linux, Windows, or the numerous application stacks like Java. Attackers can analyze and craft attacks at leisure, knowing that successful exploits can often be used against millions of computers— “break once, run anywhere.”

Security teams defend static infrastructure by trying to predict, detect, analyze, investigate and remediate attacks. This is expensive, time consuming, unwieldy and, moreover, ineffective.

Your organization can save time, money and resources by applying dynamic diversity through code scrambling and container cycling, which provide intrinsic protection for container environments. Moving Target Defense continuously changes the attack surface before hackers have a chance to decipher the environment – mitigating the attack before it happens.

In this webinar, Polyverse CEO Alex Gounares will explain how Moving Target Defense can be applied to make container environments impenetrable.

Key points include: