Processing network traffic based on assessed security weaknesses
SMV Epple, J Jesse - US Patent 10,924,517, 2021 - Google Patents
(57) ABSTRACT A threat management facility generates a simulated phishing threat based
on one or more characteristics of users of an enterprise network and transmits the simulated …
on one or more characteristics of users of an enterprise network and transmits the simulated …
Identifying and remediating phishing security weaknesses
B Bloxham, SMV Epple, JP Albert - US Patent 10,986,122, 2021 - Google Patents
(57) ABSTRACT A threat management facility generates a simulated phishing threat based
on one or more characteristics of a network user. Based on whether the user fails to respond …
on one or more characteristics of a network user. Based on whether the user fails to respond …
Software assurance system for runtime environments
RA Joyce, MP Donovan - US Patent 10,558,809, 2020 - Google Patents
An example method includes monitoring execution of one or more applications on a runtime
computing system that includes a plurality of processing units, receiving, from the runtime …
computing system that includes a plurality of processing units, receiving, from the runtime …
Real-time monitoring of network-based training exercises
SK Brueckner, MP Donovan - US Patent 10,083,624, 2018 - Google Patents
An example method includes outputting a graphical dashboard that includes one or more
learning objective nodes and one or more skill nodes, selecting one or more software …
learning objective nodes and one or more skill nodes, selecting one or more software …
Cybersecurity and threat assessment platform for computing environments
C Dominessy, S Aloisio, RA Joyce - US Patent 10,868,825, 2020 - Google Patents
An example network security and threat assessment system is configured to determine,
based on one or more events that have occurred during execution of one or more …
based on one or more events that have occurred during execution of one or more …
Automated execution and evaluation of network-based training exercises
SK Brueckner, FN Adelstein, HY Bar… - US Patent …, 2018 - Google Patents
This disclosure generally relates to automated execution and evaluation of computer
network training exercises, such as in a virtual machine environment. An example …
network training exercises, such as in a virtual machine environment. An example …
Systems and methods for improving the ranking and prioritization of attack-related events
S Aloisio, R Joyce, J Powers - US Patent 10,749,890, 2020 - Google Patents
Disclosed herein are embodiments of systems, methods, and products comprise an analytic
server, which provides a SilverlineRT system that prioritizes and analyzes security alerts and …
server, which provides a SilverlineRT system that prioritizes and analyzes security alerts and …
Systems and methods for unified hierarchical cybersecurity
R Joyce, S Aloisio - US Patent 11,128,654, 2021 - Google Patents
Disclosed herein are embodiments of systems, methods, and products comprise an analytic
server, which improves the cybersecurity of a unified system comprising a plurality of sub …
server, which improves the cybersecurity of a unified system comprising a plurality of sub …
Threat mitigation system and method
BP Murphy, J Partlow, C O'connor, J Pfeiffer - US Patent 10,735,443, 2020 - Google Patents
A computer-implemented method, computer program product and computing system for:
obtaining consolidated platform information to identify current security-relevant capabilities …
obtaining consolidated platform information to identify current security-relevant capabilities …
Computer network defense training on operational networks using software agents
MP Donovan, RA Joyce, J Powers… - US Patent 10,346,612, 2019 - Google Patents
An example method includes storing a scenario event list that defines one or more events
associated with a training exercise, and configuring, based on the events defined in the …
associated with a training exercise, and configuring, based on the events defined in the …