Patents by Inventor Kara Zaffarano

Kara Zaffarano has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10581894
    Abstract: A method for assessing effectiveness of one or more cybersecurity technologies in a computer network includes testing each of two or more component stages of an attack model at a first computer network element twice. A first one of the tests is conducted with a first one of the cybersecurity technologies operable to protect the first computer network element, and a second one of the tests is conducted with the first cybersecurity technology not operable to protect the first computer network element. For each one of the twice-tested component stages, comparing results from the first test and the second test, wherein the comparison yields or leads to information helpful in assessing effectiveness of the first cybersecurity technology on each respective one of the twice-tested component stages at the computer network element.
    Type: Grant
    Filed: April 22, 2019
    Date of Patent: March 3, 2020
    Assignee: SIEGE TECHNOLOGIES LLC
    Inventors: Kara Zaffarano, Joshua Taylor, Samuel Hamilton
  • Publication number: 20190253448
    Abstract: A method for assessing effectiveness of one or more cybersecurity technologies in a computer network includes testing each of two or more component stages of an attack model at a first computer network element twice. A first one of the tests is conducted with a first one of the cybersecurity technologies operable to protect the first computer network element, and a second one of the tests is conducted with the first cybersecurity technology not operable to protect the first computer network element. For each one of the twice-tested component stages, comparing results from the first test and the second test, wherein the comparison yields or leads to information helpful in assessing effectiveness of the first cybersecurity technology on each respective one of the twice-tested component stages at the computer network element.
    Type: Application
    Filed: April 22, 2019
    Publication date: August 15, 2019
    Inventors: Kara Zaffarano, Joshua Taylor, Samuel Hamilton
  • Patent number: 10270798
    Abstract: A method for assessing effectiveness of one or more cybersecurity technologies in a computer network includes testing each of two or more component stages of an attack model at a first computer network element twice. A first one of the tests is conducted with a first one of the cybersecurity technologies operable to protect the first computer network element, and a second one of the tests is conducted with the first cybersecurity technology not operable to protect the first computer network element. For each one of the twice-tested component stages, comparing results from the first test and the second test, wherein the comparison yields or leads to information helpful in assessing effectiveness of the first cybersecurity technology on each respective one of the twice-tested component stages at the computer network element.
    Type: Grant
    Filed: October 6, 2016
    Date of Patent: April 23, 2019
    Assignee: SIEGE TECHNOLOGIES LLC
    Inventors: Kara Zaffarano, Joshua Taylor, Samuel Hamilton
  • Publication number: 20170104780
    Abstract: A method for assessing effectiveness of one or more cybersecurity technologies in a computer network includes testing each of two or more component stages of an attack model at a first computer network element twice. A first one of the tests is conducted with a first one of the cybersecurity technologies operable to protect the first computer network element, and a second one of the tests is conducted with the first cybersecurity technology not operable to protect the first computer network element. For each one of the twice-tested component stages, comparing results from the first test and the second test, wherein the comparison yields or leads to information helpful in assessing effectiveness of the first cybersecurity technology on each respective one of the twice-tested component stages at the computer network element.
    Type: Application
    Filed: October 6, 2016
    Publication date: April 13, 2017
    Inventors: Kara Zaffarano, Joshua Taylor, Samuel Hamilton
  • Publication number: 20150205962
    Abstract: A system and method detects the existence of malicious software on a local host by analysis of software process behavior including user input events and system events. A user validation engine provides user notification. In-VM operating system monitors capture events handled by the OS, capture user input from the HMI devices, and capture system events from applications executed by the processor at hardware, kernel and/or API levels. The In-VM operating system monitors also pass captured user input and system events to the user validation engine for analysis. The user validation engine identifies legitimate user events as those that move from the hardware level upward to pre-selected applications, identifies illegitimate user events as those that start at the kernel and/or API levels, and approves communication for legitimate events while denying communication for illegitimate events.
    Type: Application
    Filed: January 21, 2015
    Publication date: July 23, 2015
    Applicant: CYLENT SYSTEMS, INC.
    Inventors: Kirk R. Swidowski, Kara A. Zaffarano, Jason M. Syversen, Joseph J. Sharkey, John J. Danahy, Ryan J. Berg