Posts
-
Aug 2nd, 2018
We’ve built an actual HUD, not a dashboard.
The time has come for the official release of the HUD. As of today, the feature users have been asking for is officially out of beta. In this post, we share the reasons users wanted the HUD to be real
-
Jul 17th, 2018
Polarity – Confluence Integration
Interoperability by Design is the foundation for our dynamic Integration Framework, allowing you to integrate with almost any database or API. The more you integrate the internal or 3rd party, commerc
-
May 24th, 2018
Save Time By Recognizing Machine Time
Occasionally our users come across UNIX Epoch time, the representation of time as the number of seconds elapsed since January 1st, 1970. The representation was not meant to be human-readable and often
-
Apr 12th, 2018
Introducing the Polarity Heads-Up-Display
What is a Heads-Up-Display (HUD)? A Heads-Up-Display, HUD for short, is a visual indicator that presents data to a person without having them look away from their usual viewpoints. A HUD was originall
-
Mar 29th, 2018
Annotating & Building a Collective Memory
What if you could build a collective memory across your team and teams that all your analysts could seamlessly benefit from? At Polarity, we post a lot about integrations and the extensibility of our
-
Mar 13th, 2018
Polarity – Open Source Intelligence Integrations
If you use open source threat intelligence platforms, we have two integrations you’re going to love. Polarity recently developed open-source integrations with AlienVault’s Open Threat Exchange (OT
-
May 29th, 2017
Always know if that URL is Malicious
Did you know that not every website you visit, or link that you might click on is safe? Well I hate to break it to you, but a decent amount of them are not. To mitigate that, Google has released their
-
May 18th, 2017
Remembering Network Ports and Services
When systems communicate on a network they often use one or more of the available 65,536 TCP/IP ports. https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers Such service names and port numbe
-
Feb 18th, 2017
Know Every Binary That Has Ever Run in Your Environment
Binary file hashes are a common indicator used in information security. Unfortunately, files hashes are hard to read, let alone memorize. Here are some examples of what file hashes look like: 18f8e43b