Processing network traffic based on assessed security weaknesses

SMV Epple, J Jesse - US Patent 10,924,517, 2021 - Google Patents
(57) ABSTRACT A threat management facility generates a simulated phishing threat based
on one or more characteristics of users of an enterprise network and transmits the simulated …

Identifying and remediating phishing security weaknesses

B Bloxham, SMV Epple, JP Albert - US Patent 10,986,122, 2021 - Google Patents
(57) ABSTRACT A threat management facility generates a simulated phishing threat based
on one or more characteristics of a network user. Based on whether the user fails to respond …

Software assurance system for runtime environments

RA Joyce, MP Donovan - US Patent 10,558,809, 2020 - Google Patents
An example method includes monitoring execution of one or more applications on a runtime
computing system that includes a plurality of processing units, receiving, from the runtime …

Real-time monitoring of network-based training exercises

SK Brueckner, MP Donovan - US Patent 10,083,624, 2018 - Google Patents
An example method includes outputting a graphical dashboard that includes one or more
learning objective nodes and one or more skill nodes, selecting one or more software …

Cybersecurity and threat assessment platform for computing environments

C Dominessy, S Aloisio, RA Joyce - US Patent 10,868,825, 2020 - Google Patents
An example network security and threat assessment system is configured to determine,
based on one or more events that have occurred during execution of one or more …

Automated execution and evaluation of network-based training exercises

SK Brueckner, FN Adelstein, HY Bar… - US Patent …, 2018 - Google Patents
This disclosure generally relates to automated execution and evaluation of computer
network training exercises, such as in a virtual machine environment. An example …

Systems and methods for improving the ranking and prioritization of attack-related events

S Aloisio, R Joyce, J Powers - US Patent 10,749,890, 2020 - Google Patents
Disclosed herein are embodiments of systems, methods, and products comprise an analytic
server, which provides a SilverlineRT system that prioritizes and analyzes security alerts and …

Systems and methods for unified hierarchical cybersecurity

R Joyce, S Aloisio - US Patent 11,128,654, 2021 - Google Patents
Disclosed herein are embodiments of systems, methods, and products comprise an analytic
server, which improves the cybersecurity of a unified system comprising a plurality of sub …

Threat mitigation system and method

BP Murphy, J Partlow, C O'connor, J Pfeiffer - US Patent 10,735,443, 2020 - Google Patents
A computer-implemented method, computer program product and computing system for:
obtaining consolidated platform information to identify current security-relevant capabilities …

Computer network defense training on operational networks using software agents

MP Donovan, RA Joyce, J Powers… - US Patent 10,346,612, 2019 - Google Patents
An example method includes storing a scenario event list that defines one or more events
associated with a training exercise, and configuring, based on the events defined in the …