PolySwarm started out with Medium as its content publishing tool. We created great, informative content; from stories on what it's like to be a woman in cybersecurity, to deep dives into technical topics like the 'commit and reveal scheme' on blockchain (and how its leveraged on PolySwarm). Recently, we created a new blog within the PolySwarm's web ecosystem, blog.polyswarm.io. This is where we will be publishing content moving forward.
Welcome to the PolySwarm Blog
Aug 19, 2019 7:25:00 PM / by PolySwarm Team posted in Insider, Media, PolySwarm
"A legitimately fascinating concept": Risky Business podcast on the PolySwarm marketplace
Aug 14, 2019 12:31:35 PM / by Anna Keeve posted in Interview, Press, Media, Explained, PolySwarm
“It’s a legitimately fascinating concept…kind of like bug bounties for both incumbent and niche AV engines.” This is what Patrick Gray said recently about cybersecurity startup PolySwarm on his podcast Risky Business.
Video: An interview with PolySwarm CEO on the PolySwarm marketplace
Aug 13, 2019 7:49:17 PM / by PolySwarm Team posted in Interview, Press, Media, PolySwarm, Leadership, Blockchain
Steve Bassi talks to BlockTempo TV about PolySwarm’s threat detection marketplace, a VirusTotal alternative that provides intelligence on malicious files and URLs. Bassi talk here about how PolySwarm can help curb cybercrime, plus his thoughts on the WannaCry attack and what blockchain projects need to be successful in 2019 and beyond.
Using PolySwarm Threat Hunting and Metadata Searching for intel on 0-days
Jul 29, 2019 8:29:00 PM / by Katherine Yan and Javier Botella Fernandez posted in PolySwarm, Product, Threat Hunting
A deep dive into using PolySwarm’s hunting features to identify malware. This demonstration shows how Threat Hunting and Metadata Searching helps analysts gather info on 0-day malware using EvilGnome as an example.
Introducing the first ever 'threat bounty'
Jun 30, 2019 10:13:00 PM / by Anna Keeve posted in Explained, PolySwarm, Product
PolySwarm’s threat detection marketplace has created the possibility of a new type of cyber-related bounty: say hello to the threat bounty