Patents by Inventor Ami Luttwak

Ami Luttwak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12182172
    Abstract: A system and method for agentless detection of sensitive data in a cloud computing environment includes generating a snapshot from a managed database service, the snapshot including a plurality of data files stored in a bucket on a cloud computing environment; detecting a data object in the plurality of data files, the data object including a data schema and a content; classifying the first data object based on the content, wherein the content is classified as sensitive data or non-sensitive data; and generating a node on a security graph stored in a graph database to represent the first data object and the classification thereof, wherein the security graph further includes a representation of the cloud computing environment.
    Type: Grant
    Filed: October 24, 2022
    Date of Patent: December 31, 2024
    Assignee: Wiz, Inc.
    Inventors: Raaz Herzberg, Avi Tal Lichtenstein, Roy Reznik, Ami Luttwak, Moran Cohen, Yaniv Shaked, Yinon Costica, George Pisha
  • Patent number: 12177184
    Abstract: A system and method for providing dynamic network traffic policies is provided. The method includes: inspecting a workload for a cybersecurity object, the cybersecurity object indicating a cybersecurity risk, wherein the workload is deployed in a cloud computing environment having a firewall connected to an external network; detecting the cybersecurity risk on the workload based on the cybersecurity object; generating a policy for the firewall based on the cybersecurity risk; and configuring the firewall to apply the generated policy.
    Type: Grant
    Filed: February 7, 2024
    Date of Patent: December 24, 2024
    Assignee: Wiz, Inc.
    Inventors: Lidor Gonshorowitz, Oron Noah, Ami Luttwak, Yinon Costica, Roy Reznik
  • Patent number: 12175428
    Abstract: A system and method for agentless generation of a software bill of materials (SBOM) in a cloud computing environment is disclosed. The method includes: accessing a plurality of workloads in a cloud computing environment; detecting in each workload of the plurality of workloads a software component; generating for each workload an SBOM based on the detected software component; and storing each SBOM in a database.
    Type: Grant
    Filed: December 7, 2023
    Date of Patent: December 24, 2024
    Assignee: Wiz, Inc.
    Inventors: Mattan Shalev, Yaniv Shaked, Gal Kozoshnik, Omri Kornblau, Roy Reznik, Ami Luttwak, Yinon Costica
  • Publication number: 20240411923
    Abstract: A system and method for agentless detection of sensitive data in a cloud computing environment. The method includes detecting a first data object including a data schema and a content in a cloud computing environment; detecting a second data object, having the data schema of the first data object; generating in a security graph: a first data object node representing the first data object, a second data object node representing the second data object, and a data schema node representing the data schema; storing a classification based on the content in the security graph, wherein the content is classified as sensitive data or non-sensitive data; and rendering an output based on the classification and the data schema node, in lieu of the first data object node and the second data object node, in response to receiving a query to detect a node representing a data object classified as sensitive data.
    Type: Application
    Filed: December 28, 2023
    Publication date: December 12, 2024
    Applicant: Wiz, Inc.
    Inventors: Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami LUTTWAK, Moran COHEN, Yaniv SHAKED, Yinon COSTICA, George PISHA
  • Patent number: 12164963
    Abstract: A system and method detecting an artificial intelligence (AI) pipeline in a cloud computing environment. The method includes: inspecting a cloud computing environment for an AI pipeline component; detecting a connection between a first AI pipeline component and a second AI pipeline component; generating a representation of each of: the first AI pipeline component, the second AI pipeline component, and the connection, in a security database; and generating an AI pipeline based on the generated representations.
    Type: Grant
    Filed: November 16, 2023
    Date of Patent: December 10, 2024
    Assignee: Wiz, Inc.
    Inventors: Ami Luttwak, Alon Schindel, Amitai Cohen, Yinon Costica, Roy Reznik, Mattan Shalev
  • Publication number: 20240403426
    Abstract: A system and method for detecting a cybersecurity object in operating system-level virtualization objects. The method comprises: inspecting a first image of an operating system-level virtualization for a cybersecurity object; inspecting a second image for the cybersecurity object, wherein the second image is based off of the first image; associating the cybersecurity object with the first image, in response to detecting the cybersecurity object in the first image and detecting the cybersecurity object in the second image; and associating the cybersecurity object with the second image, in response to detecting the cybersecurity object in the second image and not detecting the cybersecurity object in the first image.
    Type: Application
    Filed: August 8, 2024
    Publication date: December 5, 2024
    Applicant: Wiz, Inc.
    Inventors: Yaniv Joseph OLIVER, Ami LUTTWAK, Yinon COSTICA, Roy REZNIK, Yaniv SHAKED, Amir LANDE BLAU
  • Publication number: 20240396903
    Abstract: A system and method for detecting lateral movement based on an exposed cryptographic network protocol (CNP) key in a cloud computing environment. The method includes: inspecting a first workload for a private CNP key, the private CNP key associated with a hash of a public CNP key; detecting in a security database a representation of the public CNP key; generating a lateral movement path, the lateral movement path including an identifier of a second workload, the second workload represented by a representation connected to the representation of the public CNP key.
    Type: Application
    Filed: August 8, 2024
    Publication date: November 28, 2024
    Applicant: Wiz, Inc.
    Inventors: Avi Tal LICHTENSTEIN, Ami LUTTWAK, Yinon COSTICA
  • Publication number: 20240396902
    Abstract: A system and method for detecting potential lateral movement in a cloud computing environment includes detecting a private encryption key and a certificate, each of which further include a hash value of a respective public key, wherein the certificate is stored on a first resource deployed in the cloud computing environment; generating in a security graph: a private key node, a certificate node, and a resource node connected to the certificate node, wherein the security graph is a representation of the cloud computing environment; generating a connection in the security graph between the private key node and the certificate node, in response to determining a match between the hash values of the public key of the private key and the public key of the certificate; and determining that the first resource node is potentially compromised, in response to receiving an indication that an element of the public key is compromised.
    Type: Application
    Filed: August 8, 2024
    Publication date: November 28, 2024
    Applicant: Wiz, Inc.
    Inventors: Avi Tal LICHTENSTEIN, Ami LUTTWAK, Yinon COSTICA
  • Patent number: 12141291
    Abstract: A system and method for securing the development of software applications are provided.
    Type: Grant
    Filed: June 3, 2021
    Date of Patent: November 12, 2024
    Assignee: WIZ, INC.
    Inventors: Assaf Rappaport, Ami Luttwak, Roy Reznik, Yinon Costica
  • Publication number: 20240372720
    Abstract: A system and method for inspecting encrypted disks for a cybersecurity object using a custom key are disclosed. The method includes detecting an encrypted disk in a cloud computing environment, the cloud computing environment including a security policy service; authorizing a key policy on the security policy service for a custom key of an inspector account, wherein the key policy is a policy authorized to decrypt the encrypted disk; generating a second encrypted disk based on the encrypted disk; inspecting the second encrypted disk for a cybersecurity object with the custom key; and releasing a resource allocated to the second encrypted disk in response to completing the inspection.
    Type: Application
    Filed: July 17, 2024
    Publication date: November 7, 2024
    Applicant: Wiz, Inc.
    Inventors: Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA
  • Publication number: 20240314147
    Abstract: A method for scalable vulnerability detection is provided. The method includes selecting at least a workload of a plurality of workloads deployed in a first cloud environment for inspection, wherein the workload includes a first volume; generating in a remote cluster an inspection node, the inspection node including at least a first disk, wherein the remote cluster provisions inspection nodes in response to demand for inspection nodes; generating a persistent volume (PV) on which the at least a first disk is mounted, wherein the at least a first disk is generated from a snapshot of the first volume; and generating a persistent volume claim (PVC) of the PV for an inspector workload, wherein the inspector workload is configured to inspect the PV for an object, and wherein inspector workloads are provisioned in response to demand for inspector workloads.
    Type: Application
    Filed: May 23, 2024
    Publication date: September 19, 2024
    Applicant: Wiz, Inc.
    Inventors: Yarin MIRAN, Ami LUTTWAK, Roy REZNIK, Avihai BERKOVITZ, Moran COHEN, Yaniv SHAKED, Yaniv Joseph OLIVER
  • Publication number: 20240311359
    Abstract: A method and system for populating multi-layer technology product catalogs are provided.
    Type: Application
    Filed: May 23, 2024
    Publication date: September 19, 2024
    Applicant: Wiz, Inc.
    Inventors: Gal KOZOSHNIK, Raaz HERZBERG, Yinon COSTICA, Yaniv SHAKED, Daniel KLEIN, Ami LUTTWAK
  • Patent number: 12093374
    Abstract: A system and method for providing cybersecurity incident response utilizing a large language model. The method includes: mapping a received incident input into a scenario of a plurality of scenarios, each scenario including a plurality of sub-scenarios; generating a query based on the received incident input and a selection of a sub-scenario of the plurality of sub-scenarios; executing the query on a security database, the security database including a representation of the computing environment; and initiating a mitigation action based on a result of the executed query.
    Type: Grant
    Filed: April 29, 2024
    Date of Patent: September 17, 2024
    Assignee: Wiz, Inc.
    Inventors: Alon Schindel, Barak Sharoni, Amitai Cohen, Ami Luttwak, Roy Reznik, Yinon Costica
  • Patent number: 12095777
    Abstract: A system and method for detecting lateral movement based on an exposed cryptographic network protocol (CNP) key in a cloud computing environment. The method includes: inspecting a first workload for a private CNP key, the private CNP key associated with a hash of a public CNP key; detecting in a security database a representation of the public CNP key; generating a lateral movement path, the lateral movement path including an identifier of a second workload, the second workload represented by a representation connected to the representation of the public CNP key.
    Type: Grant
    Filed: February 27, 2024
    Date of Patent: September 17, 2024
    Assignee: WIZ, INC.
    Inventors: Avi Tal Lichtenstein, Ami Luttwak, Yinon Costica
  • Patent number: 12093384
    Abstract: A system and method for detecting a cybersecurity object in operating system-level virtualization objects. The method comprises: inspecting a first image of an operating system-level virtualization for a cybersecurity object; inspecting a second image for the cybersecurity object, wherein the second image is based off of the first image; associating the cybersecurity object with the first image, in response to detecting the cybersecurity object in the first image and detecting the cybersecurity object in the second image; and associating the cybersecurity object with the second image, in response to detecting the cybersecurity object in the second image and not detecting the cybersecurity object in the first image.
    Type: Grant
    Filed: June 30, 2022
    Date of Patent: September 17, 2024
    Assignee: Wiz, Inc.
    Inventors: Yaniv Joseph Oliver, Ami Luttwak, Yinon Costica, Roy Reznik, Yaniv Shaked, Amir Lande Blau
  • Patent number: 12095776
    Abstract: A system and method for detecting potential lateral movement in a cloud computing environment includes detecting a private encryption key and a certificate, each of which further include a hash value of a respective public key, wherein the certificate is stored on a first resource deployed in the cloud computing environment; generating in a security graph: a private key node, a certificate node, and a resource node connected to the certificate node, wherein the security graph is a representation of the cloud computing environment; generating a connection in the security graph between the private key node and the certificate node, in response to determining a match between the hash values of the public key of the private key and the public key of the certificate; and determining that the first resource node is potentially compromised, in response to receiving an indication that an element of the public key is compromised.
    Type: Grant
    Filed: December 22, 2023
    Date of Patent: September 17, 2024
    Assignee: WIZ, INC.
    Inventors: Avi Tal Lichtenstein, Ami Luttwak, Yinon Costica
  • Patent number: 12095912
    Abstract: A system and method for inspecting encrypted disks for a cybersecurity object using a custom key are disclosed. The method includes detecting an encrypted disk in a cloud computing environment, the cloud computing environment including a security policy service; authorizing a key policy on the security policy service for a custom key of an inspector account, wherein the key policy is a policy authorized to decrypt the encrypted disk; generating a second encrypted disk based on the encrypted disk; inspecting the second encrypted disk for a cybersecurity object with the custom key; and releasing a resource allocated to the second encrypted disk in response to completing the inspection.
    Type: Grant
    Filed: December 26, 2023
    Date of Patent: September 17, 2024
    Assignee: Wiz, Inc.
    Inventors: Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Yaniv Shaked, Eyal Moscovici
  • Publication number: 20240303325
    Abstract: A system and method for cybersecurity remediation based on a digital forensic finding is disclosed. In an embodiment, the method includes generating an inspectable disk from a disk of a resource deployed in a computing environment; mounting the inspectable disk at a mount point on a forensic analyzer; configuring the forensic analyzer to generate a forensic finding based on the inspectable disk; and initiating a remediation action based on the forensic finding.
    Type: Application
    Filed: March 6, 2023
    Publication date: September 12, 2024
    Applicant: Wiz, Inc.
    Inventors: Itay ARBEL, Mattan SHALEV, Yaniv SHAKED, Alon SCHINDEL, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA, Orr SHAMLI
  • Publication number: 20240303326
    Abstract: A system and method for iterative cybersecurity remediation based on a digital forensic finding is disclosed. In an embodiment, the method includes detecting a forensic finding, the forensic finding based on a forensic artifact detected on a disk of a resource in a computing environment; generating an inspectable disk based on the disk of the resource; inspecting the inspectable disk for a cybersecurity object based on the forensic artifact; and initiating a remediation action on the disk based on the cybersecurity object detected on the inspectable disk.
    Type: Application
    Filed: March 6, 2023
    Publication date: September 12, 2024
    Applicant: Wiz, Inc.
    Inventors: Itay ARBEL, Mattan SHALEV, Yaniv SHAKED, Alon SCHINDEL, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA, Gal KOZOSHNIK
  • Publication number: 20240303329
    Abstract: A system and method for generating a compact representation of a computing environment having a remediated cybersecurity threat is disclosed. In an embodiment, the method includes generating an inspectable disk based on a disk of a resource in the computing environment; detecting a forensic artifact on the inspectable disk; traversing a security graph for a forensic finding based on the forensic artifact, wherein the security graph includes a representation of the computing environment; detecting a remediation node connected to a node representing the forensic finding; and initiating a remediation action, represented by the remediation node.
    Type: Application
    Filed: March 6, 2023
    Publication date: September 12, 2024
    Applicant: Wiz, Inc.
    Inventors: Itay ARBEL, Mattan SHALEV, Yaniv SHAKED, Alon SCHINDEL, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA, Eric ABRAMOV