摘要:
In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
摘要:
Particular embodiments of the present invention are directed to systems and methods for predicting the outcome of events based on internet activity associated with such events. For example, an internet activity metric associated with one or more events may be determined. The internet activity metric may be based at least on the popularity of particular search terms related to the events. The outcomes of the events may also be determined. The determined internet activity metrics and the outcomes of the one or more events may be analyzed to generate an algorithm for predicting the outcomes of subsequent events. For example, an internet activity metric associated with a particular subsequent event (e.g., based at least on the popularity of a particular search term related to the subsequent event) may be determined, and the algorithm may be applied to the internet activity metric to predict the outcome of the particular subsequent event.
摘要:
In one aspect, In one aspect, a computerized method for automatic grading, impact analysis and mapping to the CIA triad, comprising: identifying a value of a plurality of data stores; associating the value back to an attack scenario such that a measure of impact with respect to attack progression or susceptibility now has a pecuniary value and generating a grading score; associating the grading score mapped to Confidentiality, Integrity and Availability (CIA) Triad; associating an attack progression with the pecuniary value and priority; identifying a progression of the attack; determining a time that is available for a response before a damage occurs to a system under attack; determining a stage of the attack in an attack kill chain, wherein for every stage of the attack as the progress happens, associating the pecuniary value and an impact for such a stage; and automatically calculates an overall data threat grade of the system.
摘要:
In one aspect, a computerized method for detecting data abuse and data exfiltration in a data store or a data lakes cloud warehouse, comprising: identifying a plurality of Command and control (CnC) channels in an enterprise data cloud infrastructure; identifying and detecting malicious compressed data transfers and encrypted data transfers; implementing a destination analysis from within the data store; and implementing data abuse detection and prevention operations.
摘要:
A system and method for recommending content to a user in a social network, including: logging user activity for the user in the social network; categorizing the user activity across all the user's networks, wherein each category is assigned a score based on relevance to the user; assigning weights to the user activities; calculating a social index score as a function of the weighted user activity categories; logging user content into categories; scoring the user content; and generating a content social index by weighting the content scores.
摘要:
Embodiments are directed towards automatically organizing an event for users to participate in an activity. The system can display suggestions for a plurality of activities to a user. Further, the system may selectively display information about at least one other user with at least one activity of the plurality of activities. The at least one other user may be identified based on the at least one other user having an interest in the at least one activity. Thus, the user may be able to view other users who are interested in an activity and may be nudged to also be interested in the activity. When a minimum number of other users indicate an explicit interest for an activity, the system can automatically organize an event for the users for the activity. The event may be a physical offline gathering of users that are interested in the activity.
摘要:
A system and method for monetizing user-generated web content are provided. The system includes a tracking engine operable to track user activity taking place a plurality of social networks. The tracking engine is in communication with an branding engine, which is notified when a user publishes content on a social network. The ad branding engine is configured to analyze user-published content and select at least one advertisement contextually related thereto. The ad branding engine incorporates the advertisement with the user-published content, and in turn, the user is compensated.
摘要:
In one aspect, a computerized method for locating one or more shadow vulnerable datastores for cloud-platform datastores includes the step of identifying a cloned data store of an original datastore in a cloud database instance. It includes the step of determining that the cloned datastore comprises a shadow vulnerable datastore. It includes the step of defining a security posture of the cloned datastore. It includes the step of publishing a digitized data clone security differential report comprising the security posture and one or more remediations to fix security posture issues.
摘要:
A computerized method for implementing risk discovery with a set of unified security and privacy policies, includes the step of discovering a set of data and a set of data accesses within an enterprise computing system. The method includes the step of classifying the set of discovered data and the set of data accesses with an identification that shows which of the data assets are important or critical for the enterprise. The method includes the step of determining which of the set of discovered data and the set of data accesses have or are associated with sensitive information. The method includes the step of placing the set of discovered data and the set of data accesses that are associated with sensitive information into a set of discovered information about the infrastructure. The method includes the step of determining which of the set of discovered data and the set of data accesses are relevant in the context of a specified governmental data privacy regulation. The method includes the step of placing the set of discovered data and the set of data accesses that are relevant in the context of a specified governmental data privacy regulation into a set of discovered information about the infrastructure. The method includes the step of, with the set of discovered information about the infrastructure, mapping the set of discovered information about the infrastructure to a set of deterministic dimensions.
摘要:
A system and method for dynamically monetizing keyword values based on a correlation between one or more indices. The method includes generating a first index for a subject being searched by users via web server, and a second index for the subject based on a corresponding level of popularity. The first index is correlated with the second index to predict a future second index for the subject based on the first index.