Abstract: A first vulnerability that is associated with one or more nodes of a network graph that represent one or more assets of a network infrastructure may be identified. Furthermore, a second vulnerability that is associated with one or more nodes of the network graph may be identified. A determination may be made as to whether the first vulnerability or the second vulnerability contributes more to a probability of a security breach associated with the network infrastructure. A notification may be provided to mitigate the vulnerability that contributes more to the probability of the security breach associated with the network infrastructure.
Type:
Grant
Filed:
October 28, 2016
Date of Patent:
June 25, 2019
Assignee:
Corax Cyber Security, Inc.
Inventors:
Jonathan Pope, Lewis Guignard, Thomas Beale
Abstract: An identification of an asset that is associated with a network infrastructure may be received. Additional assets of the network infrastructure that are associated with the asset may be identified and one or more values associated with a security breach for the additional assets of the network infrastructure that are associated with the asset may be received. Furthermore, an assessment of a security breach of the asset based on the received one or more values associated with the security breach for the additional assets of the network infrastructure may be generated.
Type:
Grant
Filed:
September 8, 2016
Date of Patent:
April 30, 2019
Assignee:
Corax Cyber Security, Inc.
Inventors:
Thomas Beale, Lewis Guignard, Jonathan Pope