CONTROLLING COMPLIANCE REMEDIATIONS

    公开(公告)号:US20210058370A1

    公开(公告)日:2021-02-25

    申请号:US16545977

    申请日:2019-08-20

    Abstract: A method provides for controlling compliance remediation that includes performing compliance inspection runs by account nodes for multiple accounts. Inspection results of the inspection runs from each account node are aggregated by an account cognitive policy advisory (CPA) service. The inspection results from each account are aggregated. It is determined whether remediations are required by analyzing the inspection results combined with a current compliance mode of a server. Upon a determination that the current compliance mode of the server is a first mode, the account CPA service determines whether a policy fingerprint has changed. Upon a change to the policy fingerprint, compliance enforcement runs on the account nodes are temporarily suspended.

    Root Cause Identification and Analysis
    33.
    发明申请

    公开(公告)号:US20200272973A1

    公开(公告)日:2020-08-27

    申请号:US16282565

    申请日:2019-02-22

    Abstract: Embodiments relate to monitoring an information technology (IT) environment having a plurality of domains through key performance indicator (KPI) data. In response to detection of a technical health problem, a first KPI related to the problem is identified. A root cause analysis is performed on the identified KPI generating a knowledge graph. A second KPI related to the first KPI is identified through the discovery of a correlation between the two identified KPIs. A diagnosis is generated for the technical health problem within the IT environment based on the discovered hidden correlation between the first KPI and second KPI. The generated diagnosis includes the root cause of the technical health issue.

    Detecting a Root Cause for a Vulnerability Using Subjective Logic in Social Media

    公开(公告)号:US20200153851A1

    公开(公告)日:2020-05-14

    申请号:US16734322

    申请日:2020-01-04

    Abstract: A method and system of identifying a computing device vulnerability is provided. Social media communication is monitored. Social media threads that are related to a vulnerability, based on the monitored social media communication, are identified, filtered, and categorized into one or more predetermined categories of computing device vulnerabilities. Upon determining that a number of social media posts related to the vulnerability is above a first predetermined threshold, one or more dependable social media threads in a same one or more categories as the vulnerability are searched. One or more possible root causes of the vulnerability are determined from the searched dependable social media threads. A validity score for each of the one or more possible root causes is assigned. A possible root cause from that has a highest validity score that is above a second predetermined threshold is selected to be the root cause of the vulnerability.

    Compliance aware application scheduling

    公开(公告)号:US11954524B2

    公开(公告)日:2024-04-09

    申请号:US17330583

    申请日:2021-05-26

    CPC classification number: G06F9/4881 G06F9/5005 G06F2209/5011 G06F2209/503

    Abstract: A method for scheduling services in a computing environment includes receiving a service scheduling request corresponding to the computing environment and identifying a resource pool and a set of compliance requirements corresponding to the computing environment. The method continues by identifying target resources within the resource pool, wherein target resources are resources which meet the set of compliance requirements, and subsequently identifying a set of available target resources, wherein available target resources are target resources with scheduling availability. The method further includes analyzing the set of available target resources to determine a risk score for each available target resource and selecting one or more of the set of available target resources according to the determined risk scores. The method continues by scheduling a service corresponding to the service scheduling request on the selected one or more available target resources.

    PRIORITIZATION OF ATTACK TECHNIQUES AGAINST AN ORGANIZATION

    公开(公告)号:US20240114046A1

    公开(公告)日:2024-04-04

    申请号:US17937854

    申请日:2022-10-04

    CPC classification number: H04L63/1433

    Abstract: One or more systems, devices, computer program products and/or computer-implemented methods provided herein relate to prioritization of attack techniques and cyber security events. According to an embodiment, an attack prioritization engine can receive security events, train an artificial intelligence model to rank respective cyber security events as a function of risk, and output a prioritization of security events to address. A mapping component can map asset vulnerabilities to attack techniques. A calculation component can calculate and aggregate scores for respective attack techniques. An attack surface component can extract features from the aggregation of scores to rank attack techniques and determine an attack surface. The mapping component can further map security events to the attack techniques.

Patent Agency Ranking