Invention Grant
- Patent Title: Identifying vulnerabilities of computing assets based on breach data
- Patent Title (中): 根据违规数据识别计算资产的漏洞
-
Application No.: US14642620Application Date: 2015-03-09
-
Publication No.: US09270695B2Publication Date: 2016-02-23
- Inventor: Michael Roytman , Edward T. Bellis , Jeffrey Heuer
- Applicant: Risk I/O, Inc.
- Applicant Address: US IL Chicago
- Assignee: Risk I/O, Inc.
- Current Assignee: Risk I/O, Inc.
- Current Assignee Address: US IL Chicago
- Agency: Hickman Palermo Becker Bingham LLP
- Main IPC: G06F21/00
- IPC: G06F21/00 ; H04L29/06

Abstract:
Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.
Public/Granted literature
- US20150237065A1 Ordered Computer Vulnerability Remediation Reporting Public/Granted day:2015-08-20
Information query