Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

109 results about "Cybersafety" patented technology

Digital asset based cyber risk algorithmic engine, integrated cyber risk methodology and automated cyber risk management system

We are in a digital revolution. Over 85% of an organization's value is in digital form. Digital assets are systems, processes, data and technologies. Cyber exposures are quantified and cyber risks are scored. A graphical user interface visualizes a cyber-risk engine that quantifies cyber risk in alignment to how insurance companies pay claims, using flexible and multiple cyber risk algorithms that are prescribed in relationship to a customer's risk requirements. Digital asset cyber risk ratings are measured to increase cyber resiliency. A cyber risk management platform automates business processes across each cybersecurity function that provides data from near-real time cybersecurity tools for participants to reduce cyber risk back to acceptable risk tolerances and improve cyber resiliency.
Owner:RISKQ INC

System and method for predicting and mitigating cybersecurity system misconfigurations

A computerized method for reconfiguring one or more malware detection systems each performing cybersecurity analyses on incoming data is described. The method involves receiving meta-information including metrics associated with a malware detection system. Based on the meta-information, a determination is made whether the malware detection system is operating at an optimal performance level. If not, results produced by conducting behavior analyses predicting operability of the malware detection system are determined and the results are provided as feedback to the malware detection system to update one or more configuration parameter values thereof.
Owner:FIREEYE INC

Automated cybersecurity threat detection with aggregation and analysis

The systems and methods described herein generally relate to techniques for automated detection, aggregation, and integration of cybersecurity threats. The system ingests multiple data feeds which can be in one or numerous different formats. The system evaluates information based on defined scores to display to users threats and risks associated with them. The system also calculates decay rates for expiration of threats and indicators through various methods.
Owner:THREATQUOTIENT INC

Ai-driven defensive cybersecurity strategy analysis and recommendation system

A system and method for automated cybersecurity defensive strategy analysis that predicts the evolution of new cybersecurity attack strategies and makes recommendations for cybersecurity improvements to networked systems based on a cost / benefit analysis. The system and method use machine learning algorithms to run simulated attack and defense strategies against a model of the networked system created using a directed graph. Recommendations are generated based on an analysis of the simulation results against a variety of cost / benefit indicators. The recommendation engine runs continuously, makes suggestions, and takes adjustably autonomous actions to go further and actuate parts of the system using an orchestration service employing a distributed computational graph and actuation plugins based on generated plans. Actions are validated as required or as prudent from appropriate simulation modeling services.
Owner:QOMPLX INC

User-reported malicious message evaluation using machine learning

An indication of a message that was identified by a recipient user of the message as being associated with a cybersecurity attack is received. Properties of the message are extracted. The extracted properties of the message are provided as inputs to a machine learning model to determine a likelihood the message is associated with a true cybersecurity attack. The determined likelihood is utilized to handle a security response associated with the message.
Owner:SERVICENOW INC

PXE trusted starting method for pre-starting execution environment of Shenwei server

The invention discloses a PXE trusted boot method for a pre-boot execution environment of a Shenwei server, and belongs to the field of safe and trusted boot of a server access network. The method ischaracterized in that in a system composed of a PXE server and a PXE client (Shenwei server), hash value of a PXE startup file is calculated as a reference value during publishing of a reference valuestorage module of a client. Then, the value is stored in the reference value storage module of the client. When the PXE client carries out PXE starting, the PXE client carries out PXE starting. The PXE startup file is downloaded from the PXE server. A trusted measurement module calculates a hash value of the PXE startup file by using a same hash algorithm. The hash value is used as a measurementvalue and is compared with a reference value. If the hash value is the same as the reference value, the PXE startup file is trusted, and if the hash value is not the same as the reference value, the PXE startup file is not trusted, and sends a warning signal. The PXE starting file is subjected to credible measurement, whether the PXE starting file is credible or not is judged, and the PXE startingsafety of the Shenwei server is improved.
Owner:BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products