Patents by Inventor Chad Loder

Chad Loder has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10546134
    Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.
    Type: Grant
    Filed: August 3, 2018
    Date of Patent: January 28, 2020
    Assignee: Rapid7, Inc.
    Inventors: Derek M Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li
  • Patent number: 10447709
    Abstract: A reconnaissance and assessment (RA) tool can receive base information about the network, such as basic network information and details about an entity and personnel associated with network. The RA tool can utilize the base information to perform reconnaissance procedures on the network to identify the attack surface of the network. The RA tool can perform reconnaissance on the network, itself, and on other external sources, such as third party databases, search engines, and partner networks. Once the attack surface is identified, the RA tool can automatically perform appropriate security assessments on the attack surface. Additionally, if additional information is determined about the network during the security assessments, the RA tool can perform additional reconnaissance and security assessments based on the additional information.
    Type: Grant
    Filed: December 29, 2010
    Date of Patent: October 15, 2019
    Assignee: Rapid7, Inc.
    Inventors: Anastasios Giakouminakis, Chad Loder, Richard Li
  • Publication number: 20190034640
    Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.
    Type: Application
    Filed: August 3, 2018
    Publication date: January 31, 2019
    Inventors: Derek M. Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li
  • Patent number: 10043011
    Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.
    Type: Grant
    Filed: January 19, 2011
    Date of Patent: August 7, 2018
    Assignee: Rapid7, LLC
    Inventors: Derek M. Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li
  • Patent number: 9411965
    Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.
    Type: Grant
    Filed: September 22, 2015
    Date of Patent: August 9, 2016
    Assignee: Rapid7 LLC
    Inventors: Anastasios Giakouminakis, Sheldon E Malm, Chad Loder, Richard D Li
  • Patent number: 9270694
    Abstract: A security assessment tool can determine computer assets in a network and provide an overall security score for the network. The overall security score can represent an objective measure of the security of the network that considers potential security threats to the computer assets, counter measures deployed in the network to address the potential security threats, and the effectiveness of the counter measures. Based on the overall security assessment, the security assessment tool can provide recommendations for improving the security of the network.
    Type: Grant
    Filed: May 21, 2013
    Date of Patent: February 23, 2016
    Assignee: RAPID7, LLC
    Inventors: Chad Loder, Dana Elizabeth Wolf, Matthew Robert Hathaway
  • Patent number: 9251282
    Abstract: Systems and methods of determining compliance of content in a website or web application are disclosed. The systems and methods comprise a compliance tool to retrieve data associated with website or web application content. The compliance tool can scan the data to determine references to network locations. The compliance tool can compare the references to one or more approval rules to determine whether the references comply with the approval rules. A report can be compiled and outputted that indicates which references comply and which references do not comply with the approval rules. A user can have the option to add non-complying references to an approved list. The compliance tool can further remove non-complying references from the website or web application data and/or register non-complying references with a firewall.
    Type: Grant
    Filed: June 21, 2010
    Date of Patent: February 2, 2016
    Assignee: RAPID7 LLC
    Inventor: Chad Loder
  • Publication number: 20160012236
    Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.
    Type: Application
    Filed: September 22, 2015
    Publication date: January 14, 2016
    Inventors: Anastasios Giakouminakis, Sheldon E. Malm, Chad Loder, Richard D. Li
  • Patent number: 9141805
    Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.
    Type: Grant
    Filed: November 17, 2011
    Date of Patent: September 22, 2015
    Assignee: RAPID7 LLC
    Inventors: Anastasios Giakouminakis, Sheldon E. Malm, Chad Loder, Richard D. Li
  • Publication number: 20140351940
    Abstract: A security assessment tool can determine computer assets in a network and provide an overall security score for the network. The overall security score can represent an objective measure of the security of the network that considers potential security threats to the computer assets, counter measures deployed in the network to address the potential security threats, and the effectiveness of the counter measures. Based on the overall security assessment, the security assessment tool can provide recommendations for improving the security of the network.
    Type: Application
    Filed: May 21, 2013
    Publication date: November 27, 2014
    Applicant: Rapid7, LLC
    Inventors: Chad Loder, Dana Elizabeth Wolf, Matthew Robert Hathaway
  • Publication number: 20130074188
    Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.
    Type: Application
    Filed: November 17, 2011
    Publication date: March 21, 2013
    Inventors: Anastasios Giakouminakis, Sheldon E. Malm, Chad Loder, Richard D. Li
  • Publication number: 20120185944
    Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.
    Type: Application
    Filed: January 19, 2011
    Publication date: July 19, 2012
    Inventors: Derek M. Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li
  • Publication number: 20120174228
    Abstract: A reconnaissance and assessment (RA) tool can receive base information about the network, such as basic network information and details about an entity and personnel associated with network. The RA tool can utilize the base information to perform reconnaissance procedures on the network to identify the attack surface of the network. The RA tool can perform reconnaissance on the network, itself, and on other external sources, such as third party databases, search engines, and partner networks. Once the attack surface is identified, the RA tool can automatically perform appropriate security assessments on the attack surface. Additionally, if additional information is determined about the network during the security assessments, the RA tool can perform additional reconnaissance and security assessments based on the additional information.
    Type: Application
    Filed: December 29, 2010
    Publication date: July 5, 2012
    Inventors: Anastasios Giakouminakis, Chad Loder, Richard Li
  • Publication number: 20110314152
    Abstract: Systems and methods of determining compliance of content in a website or web application are disclosed. The systems and methods comprise a compliance tool to retrieve data associated with website or web application content. The compliance tool can scan the data to determine references to network locations. The compliance tool can compare the references to one or more approval rules to determine whether the references comply with the approval rules. A report can be compiled and outputted that indicates which references comply and which references do not comply with the approval rules. A user can have the option to add non-complying references to an approved list. The compliance tool can further remove non-complying references from the website or web application data and/or register non-complying references with a firewall.
    Type: Application
    Filed: June 21, 2010
    Publication date: December 22, 2011
    Inventor: Chad LODER
  • Publication number: 20110191854
    Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities. The security tool can determine the risk level based on exploits associated with the vulnerabilities. The security tool can determine the risk level based on factors associated with the exploits such as whether an exploit exists, a rank of the exploit, a number of exploits that exist for the vulnerability, a difficulty to identify whether the exploit exists, and an effect of the exploit on the vulnerability. The security tool can a report identifying the vulnerabilities of the computing system, the exploits associated with the vulnerabilities, and the risk level of the vulnerabilities. The report can also include links to information about the exploits.
    Type: Application
    Filed: March 30, 2010
    Publication date: August 4, 2011
    Inventors: Anastasios Giakouminakis, Chad Loder, Corey E. Thomas, H. D. Moore