COMPLIANCE CONTENT GENERATION
    41.
    发明申请

    公开(公告)号:US20220413847A1

    公开(公告)日:2022-12-29

    申请号:US17358166

    申请日:2021-06-25

    IPC分类号: G06F8/73 G06F8/10 G06F8/30

    摘要: A content generation method includes receiving a control document comprising one or more control clauses, identifying actionable content for the one or more control clauses, generating a programming language template for the one or more control clauses, identifying a closest existing control clause from a database for each of the one or more control clause, identifying a programming language implementation of the closest existing control clause, identifying similarities and differences between the programming language implementation and the generated programming language template, and annotating the programming language implementation for the closest existing control clause based on the identified similarities and differences. The method may additionally include determining whether a closest existing control clause exists, providing the generated programming language template to a user responsive to determining that a closest existing control clause does not exist, and receiving feedback from the user regarding the generated programming language template.

    Machine learning model for micro-service compliance requirements

    公开(公告)号:US11488064B2

    公开(公告)日:2022-11-01

    申请号:US16834463

    申请日:2020-03-30

    摘要: Embodiments relate to a computer system, computer program product, and computer-implemented method to train a machine learning (ML) model using artificial intelligence to learn an association between (regulatory) compliance requirements and features of micro-service training datasets. The trained ML model is leveraged to determine the compliance requirements of a micro-service requiring classification. In an exemplary embodiment, once the micro-service has been classified with respect to applicable compliance requirements, the classified micro-service may be used as an additional micro-service training dataset to further train the ML model and thereby improve its performance.

    CONTEXT BASED RISK ASSESSMENT OF A COMPUTING RESOURCE VULNERABILITY

    公开(公告)号:US20220131888A1

    公开(公告)日:2022-04-28

    申请号:US17078603

    申请日:2020-10-23

    IPC分类号: H04L29/06

    摘要: According to an embodiment, a computer-implemented method can comprise: inspecting, using a processor, a set of container images respectively associated with pods; identifying, using the processor, a first subset of the pods that contain a vulnerability; classifying, using the processor, the first subset of the pods as primary-infected pods; generating, using the processor, a first list of namespaces in which the primary-infected pods are deployed within a network; checking, using the processor, network policies in connection with the first list of namespaces to determine secondary-suspect pods that have ability to communicate with the primary-infected pods; generating, using the processor, a list of secondary-suspect namespaces in which the secondary-suspect pods are deployed within the network; identifying, using the processor, one or more secondary-suspect pods that communicated with one or more primary-infected pods; and generating, using the processor, a list of secondary-infected pods.

    Detecting a root cause for a vulnerability using subjective logic in social media

    公开(公告)号:US11146586B2

    公开(公告)日:2021-10-12

    申请号:US16734322

    申请日:2020-01-04

    IPC分类号: H04L29/06 H04L12/58 G06Q50/00

    摘要: A method and system of identifying a computing device vulnerability is provided. Social media communication is monitored. Social media threads that are related to a vulnerability, based on the monitored social media communication, are identified, filtered, and categorized into one or more predetermined categories of computing device vulnerabilities. Upon determining that a number of social media posts related to the vulnerability is above a first predetermined threshold, one or more dependable social media threads in a same one or more categories as the vulnerability are searched. One or more possible root causes of the vulnerability are determined from the searched dependable social media threads. A validity score for each of the one or more possible root causes is assigned. A possible root cause from that has a highest validity score that is above a second predetermined threshold is selected to be the root cause of the vulnerability.

    Detecting a root cause for a vulnerability using subjective logic in social media

    公开(公告)号:US10587643B2

    公开(公告)日:2020-03-10

    申请号:US15825089

    申请日:2017-11-28

    IPC分类号: H04L29/06 H04L12/58 G06Q50/00

    摘要: A method and system of identifying a computing device vulnerability is provided. Social media communication is monitored. Social media threads that are related to a vulnerability, based on the monitored social media communication, are identified, filtered, and categorized into one or more predetermined categories of computing device vulnerabilities. Upon determining that a number of social media posts related to the vulnerability is above a first predetermined threshold, one or more dependable social media threads in a same one or more categories as the vulnerability are searched. One or more possible root causes of the vulnerability are determined from the searched dependable social media threads. A validity score for each of the one or more possible root causes is assigned. A possible root cause from that has a highest validity score that is above a second predetermined threshold is selected to be the root cause of the vulnerability.

    Dynamic re-composition of patch groups using stream clustering

    公开(公告)号:US10540496B2

    公开(公告)日:2020-01-21

    申请号:US15721566

    申请日:2017-09-29

    IPC分类号: G06F12/16 G06F21/56 G06F11/34

    摘要: Techniques for dynamic server groups that can be patched together using stream clustering algorithms, and learning components in order to reuse the repeatable patterns using machine learning are provided herein. In one example, in response to a first risk associated with a first server device, a risk assessment component patches a server group to mitigate a vulnerability of the first server device and a second server device, wherein the server group is comprised of the first server device and the second server device. Additionally, a monitoring component monitors data associated with a second risk to the server group to mitigate the second risk to the server group.

    Detecting a Root Cause for a Vulnerability Using Subjective Logic in Social Media

    公开(公告)号:US20190166151A1

    公开(公告)日:2019-05-30

    申请号:US15825089

    申请日:2017-11-28

    IPC分类号: H04L29/06 G06Q50/00 H04L12/58

    摘要: A method and system of identifying a computing device vulnerability is provided. Social media communication is monitored. Social media threads that are related to a vulnerability, based on the monitored social media communication, are identified, filtered, and categorized into one or more predetermined categories of computing device vulnerabilities. Upon determining that a number of social media posts related to the vulnerability is above a first predetermined threshold, one or more dependable social media threads in a same one or more categories as the vulnerability are searched. One or more possible root causes of the vulnerability are determined from the searched dependable social media threads. A validity score for each of the one or more possible root causes is assigned. A possible root cause from that has a highest validity score that is above a second predetermined threshold is selected to be the root cause of the vulnerability.