|
2025
|
Invention
|
Techniques for utilizing a sensor in detecting privilege escalation.
A system and method for det... |
|
|
Invention
|
Techniques for improved virtual instance inspection utilizing disk cloning.
A system and method ... |
|
|
Invention
|
System and method for detecting vulnerability of data in a cloud computing environment.
A system... |
|
|
Invention
|
Techniques for system feedback in remediating cybersecurity risks.
A system and method for initi... |
|
|
Invention
|
System and method for improving efficiency in natural language query processing utilizing languag... |
|
|
Invention
|
System and method for validating a signature of a virtual workload image in runtime.
A method an... |
|
|
Invention
|
System and method for risk monitoring of cloud based computing environments.
A system and method... |
|
|
Invention
|
Techniques for lateral movement detection in a cloud computing environment.
A system and method ... |
|
|
Invention
|
System and method for identifying cybersecurity risk source in container image layers.
A system ... |
|
|
Invention
|
System and method for recursive inspection of workloads from configuration code to production env... |
|
|
Invention
|
Techniques for signatureless virtual instance image verification in cloud computing environments.... |
|
|
Invention
|
System and method for natural language query processing utilizing language model techniques.
A s... |
|
|
Invention
|
System and method for detecting excessive permissions in identity and access management.
A syste... |
|
|
Invention
|
System and method for delayed log ingestion utilizing agentless collection. A system and method f... |
|
|
Invention
|
Techniques for detecting applications paths utilizing exposure analysis.
A system and method for... |
|
|
Invention
|
Techniques for active inspection of cloud computing applications utilizing optical character reco... |
|
|
Invention
|
System and method for generating normalized event logs for cloud detection and response in a mult... |
|
|
Invention
|
Techniques for cybersecurity incident investigation utilizing timeline generation based on entity... |
|
|
Invention
|
Techniques for cross entity correlation of user accounts in cloud computing environments. A syste... |
|
|
Invention
|
System and method for exposed software service detection. A method and system for detecting an ex... |
|
|
Invention
|
Api discovery techniques utilizing a managed router service. A method and system for API path dis... |
|
|
Invention
|
Techniques for detection of cybersecurity issues on third party software appliances utilizing cus... |
|
|
Invention
|
System and method for applying cybersecurity controls on cloud native routing services. A system ... |
|
|
Invention
|
Techniques for code intent discovery. A system and method for detecting code intent of code objec... |
|
|
Invention
|
Parsing techniques.
A system and method for parsing. A method includes querying a language model... |
|
|
Invention
|
Cybersecurity root cause analysis using computing resource name correlation. A system and method ... |
|
|
Invention
|
Temporal cause analysis of cybersecurity events. A system and method for temporal cause analysis ... |
|
|
Invention
|
Techniques for api endpoint mitigation. A system and method for initiating a mitigation action fo... |
|
|
Invention
|
System and method for root cause analysis using tree structure analysis. A system and method for ... |
|
|
Invention
|
System and method for analyzing network objects in a cloud environment.
A method and system for ... |
|
|
Invention
|
Activity graph for automated investigation. A system and method for generating an activity graph ... |
|
|
P/S
|
Downloadable software and downloadable software applications for use in the field of cloud-securi... |
|
|
P/S
|
Downloadable software and downloadable software applications
for use in the field of cloud-secur... |
|
2024
|
Invention
|
Detection engine with stateful detection with entity stream. A system and method for detection of... |
|
|
Invention
|
Detection engine having risk-based severity alerts. A system and method for executing mitigation ... |
|
|
Invention
|
System and method for detecting software lifecycle vulnerabilities. A system and method for initi... |
|
|
Invention
|
Techniques for cybersecurity threat detection utilizing sensor-based aggregated runtime execution... |
|
|
Invention
|
Techniques for detecting cloud identity misuse based on runtime context and static analysis.
A s... |
|
|
Invention
|
Endpoint detection and response based on aggregated runtime execution data. A system and method f... |
|
|
Invention
|
Techniques for reduction of storage events in a cloud computing environment.
A method for genera... |
|
|
Invention
|
Techniques for incident response and static analysis representation in computing environments.
A... |
|
|
Invention
|
Techniques for constraint- and risk-based cybersecurity inspection in cloud computing environment... |
|
|
Invention
|
System and method for cloud computing resource optimization for cybersecurity inspection.
A meth... |
|
|
Invention
|
Techniques for virtual private cloud flow logs aggregation.
A method for generating and storing ... |
|
|
Invention
|
Techniques for cloud deployment automation based on cybersecurity scanning.
A system and method ... |
|
|
Invention
|
Temporal cause analysis of cybersecurity events.
A system and method for temporal cause analysis... |
|
|
Invention
|
Multi-architecture cybersecurity sensor for cybersecurity risk detection based on run-time detect... |
|
|
Invention
|
System and method for identifying cybersecurity risk source in container image layers. A system a... |
|
2023
|
Invention
|
System and method for generating a security graph in a cloud computing environment. A cybersecuri... |
|
2022
|
Invention
|
System and method for detecting vulnerability of data in a cloud computing environment. A system ... |
|
|
P/S
|
Downloadable software for development and deployment of cloud software applications for cyber sec... |
|
2021
|
P/S
|
Downloadable software for development and deployment of
cloud software applications for cyber se... |
|
2020
|
P/S
|
Downloadable software for deployment of cloud software applications for cyber security; Downloada... |