Systems and methods for workspace continuity and remediation
CA Andrews, GS Dhoble, ND Grobelny… - US Patent …, 2022 - Google Patents
Systems and methods for modernizing workspace and hard ware lifecycle management in
an enterprise productivity ecosystem are described. In some embodiments, a client …
an enterprise productivity ecosystem are described. In some embodiments, a client …
System, device, and method of determining cyber attack vectors and mitigating cyber attacks
IY Mizrahi, M Hart, Y Hollander - US Patent 11,563,770, 2023 - Google Patents
System, device, and method of determining cyber-attack vectors and mitigating cyber-
attacks. A method includes: scanning and mapping a network, and collecting data about …
attacks. A method includes: scanning and mapping a network, and collecting data about …
System and method for determining vulnerability metrics for graph-based configuration security
M Albanese, ME Mosko - US Patent 11,930,046, 2024 - Google Patents
A system is provided for determining vulnerability metrics for graph-based configuration
security. During operation, the system generates a multi-layer graph for a system with a …
security. During operation, the system generates a multi-layer graph for a system with a …
Comprehensive risk assessment
D Trivellato, E Zambon-Mazzocato - US Patent App. 17/668,294, 2022 - Google Patents
Abstract Systems, methods, and related technologies for determining a comprehensive risk
score or value are described. The risk score determination may include selecting an entity …
score or value are described. The risk score determination may include selecting an entity …
Hybrid machine learning and knowledge graph approach for estimating and mitigating the spread of malicious software
GA Albero, M Mukherjee - US Patent 11,914,709, 2024 - Google Patents
Aspects of the disclosure relate to predicting the spread of malicious software. The
computing platform may identify malicious software at a computing device and may input …
computing platform may identify malicious software at a computing device and may input …
Security verification method and apparatus for attacked smart home Internet of Things system
Q ZHANG, S Zhang, W Xizao, S Shen… - US Patent …, 2022 - Google Patents
(57) ABSTRACT A method and an apparatus for security verification of a smart home IoT
system under attack. A finite state machine based on the device description information and …
system under attack. A finite state machine based on the device description information and …
Distributed network-level probabilistic attack graph generation
AT Colyandro - US Patent 11,765,195, 2023 - Google Patents
A method for generating a network-level attack graph is described. A first computing device
in a network generates a first attack graph and transmits the first attack graph to a central …
in a network generates a first attack graph and transmits the first attack graph to a central …
Systems and methods for workspace continuity and remediation
CA Andrews, GS Dhoble, ND Grobelny… - US Patent …, 2023 - Google Patents
Abstract Systems and methods for modernizing workspace and hardware lifecycle
management in an enterprise productivity ecosystem are described. In some embodiments …
management in an enterprise productivity ecosystem are described. In some embodiments …
Operational network risk mitigation system and method
Y Attar, L Levitsky, M Dobrushin, A Elizur… - US Patent …, 2023 - Google Patents
Such fixing may involve any software/application/component with detected vulnerabilities
and may require various remediations. After establishing which vulnerabilities require the …
and may require various remediations. After establishing which vulnerabilities require the …
Method for monitoring data transiting via a user equipment
H Sedjelmaci - US Patent 11,936,665, 2024 - Google Patents
A method for monitoring data transiting via a user equipment is described, as well as a cyber
attack detection device, The method includes obtaining a first decision from a first cyber …
attack detection device, The method includes obtaining a first decision from a first cyber …