|
2025
|
Invention
|
Cloud computing environment asset monitoring.
Techniques for monitoring assets in a cloud comput... |
|
|
Invention
|
Cybersecurity vulnerability risk determination.
Techniques for analyzing cybersecurity vulnerabi... |
|
|
Invention
|
Network attack path visualization.
The techniques described herein relate to visualizing network... |
|
|
P/S
|
Installation of computer software for network and application security in the areas of network vu... |
|
|
Invention
|
Techniques for operating a computer network security system in a cloud computing environment.
Ma... |
|
|
Invention
|
Event-driven monitoring of resources in a cloud computing environment.
Techniques for event driv... |
|
|
Invention
|
Proactive protection of computer networks against unexploited vulnerabilities.
A server determin... |
|
|
Invention
|
Techniques for detecting cyberattacks on an authentication system.
Some embodiments provide tech... |
|
|
Invention
|
Visual exploration for efficient access analysis for cloud provider entities.
An access policy a... |
|
|
Invention
|
System for collecting computer network entity information employing abstract models.
An entity t... |
|
|
Invention
|
Used cached summaries for efficient access analysis for cloud provider entities.
An access polic... |
|
|
Invention
|
Techniques for detecting malicious software in a computing asset.
Some embodiments provide techn... |
|
2024
|
Invention
|
Updating remote scan engines with custom vulnerability checks.
Various embodiments include syste... |
|
|
Invention
|
Single round trip collection of user and group data for security posture assessment.
A software ... |
|
|
Invention
|
Dimensionality reduction technique for training dataset with bit string features.
An anomaly det... |
|
|
Invention
|
Transaction conflict resolution in a file-system-backed database system.
Embodiments of a transa... |
|
|
Invention
|
Techniques for chronological vulnerability event recognition.
Techniques for identifying vulnera... |
|
|
Invention
|
Machine learning techniques for generating common vulnerability scoring system vectors.
Some emb... |
|
|
P/S
|
Installation of computer software for network and
application security in the areas of network v... |
|
|
Invention
|
System for automatically discovering, enriching and remediating entities interacting in a compute... |
|
|
Invention
|
Generating configuration change event stream for event-driven assessment of resources. A configur... |
|
|
Invention
|
Intelligent identification of correlations across security services. Various embodiments include ... |
|
|
Invention
|
File directory structure and naming convention for storing columnar tables. A database system sto... |
|
|
Invention
|
Systems and methods for determining current risk of cybersecurity vulnerabilities. Techniques for... |
|
2023
|
Invention
|
Techniques for detecting cyberattacks on an authentication system. Some embodiments provide techn... |
|
|
Invention
|
Techniques for identifying network attack paths. The techniques described herein relate to identi... |
|
|
Invention
|
Techniques for visualizing network attack paths. An example method includes using at least one co... |
|
|
Invention
|
Security service platform for rule matching. Various embodiments include systems and methods pert... |
|
|
Invention
|
Providing obfuscated results to a network scanner. As an example, an asset receives a request fro... |
|
|
Invention
|
Software testing system for detecting code injection vulnerabilities. Systems and methods are dis... |
|
|
Invention
|
Security rule matching over structurally deduplicated network data. Various embodiments include s... |
|
|
Invention
|
Cloud integrated network security. Various embodiments include systems and methods pertaining to ... |
|
|
P/S
|
Downloadable computer software for use in detecting, analyzing, and prioritizing cyber computer t... |
|
|
Invention
|
Mirroring traffic in a service mesh to detect and block offending microservices. In some examples... |
|
2022
|
Invention
|
Vulnerability detection at points of exposure. Methods and systems for identifying a vulnerabilit... |
|
|
Invention
|
Storing scan requests for fast preparatory scans of an asset. A method for authenticated asset as... |
|
|
Invention
|
Honey repository. Embodiments disclose a honeyrepo implemented in a cybersecurity computing envir... |
|
|
Invention
|
Application-level cybersecurity using multiple stages of classifiers. Various embodiments include... |
|
|
Invention
|
Cyberattack detection using multiple stages of classifiers. Various embodiments include systems a... |
|
|
Invention
|
Predictive scan engine runtime durations. Various embodiments include systems and methods to impl... |
|
|
Invention
|
Signed remote execution for assessment of network system assets. A method for authenticated asset... |
|
|
Invention
|
Policy exceptions for assessment of network system assets. A method for authenticated asset asses... |
|
|
Invention
|
Predicting a probability associated with an unexploited vulnerability. A server determines vulner... |
|
|
Invention
|
Security posture recommender system. Various embodiments include systems and methods to implement... |
|
|
Invention
|
Vulnerability result integration scheme. Various embodiments include systems and methods to imple... |
|
|
Invention
|
Command line parsing for classification of process start alerts. A method includes obtaining a co... |
|
|
Invention
|
Complementary scan engine scheme. Various embodiments include systems and methods to implement a ... |
|
|
Invention
|
Visual exploration for efficient access analysis for cloud provider entities. An access policy an... |
|
2021
|
Invention
|
Recognizing and mitigating successful cyberattacks. Embodiments of a cyberattack monitoring syste... |
|
|
Invention
|
Organization vendor-based risk assessment using internet telemetry. Various embodiments include s... |
|
2020
|
Invention
|
Automated generation of anomaly scenarios for testing machine learned anomaly detection models. A... |
|
|
Invention
|
Predictive modeling to identify anomalous log data. Disclosed herein are methods, systems, and pr... |
|
2019
|
Invention
|
Data value classifier. Methods and systems for identifying targets on a network. The disclosed me... |