Ontology Mapping System
    1.
    发明申请

    公开(公告)号:US20220141234A1

    公开(公告)日:2022-05-05

    申请号:US17519639

    申请日:2021-11-05

    摘要: An article of manufacture includes a non-transitory medium including machine-readable instructions. The instructions are to be read and executed by a processor. The instructions, when read and executed by the processor, to cause the processor to receive a malware analysis of a malware from a computer security source and receive other malware analyses. Each other malware analysis is of another malware from another computer security source. The instructions may further cause the processor to perform a fuzzy matching algorithm to quantify a similarity of the malware analyses, determine that the malware is a same malware as other malware based upon results of the fuzzy matching algorithm, and later take a same corrective action for malware based upon a receipt of the malware analysis.

    Automated Cybersecurity Threat Detection with Aggregation and Analysis

    公开(公告)号:US20210173924A1

    公开(公告)日:2021-06-10

    申请号:US17157134

    申请日:2021-01-25

    摘要: The systems and methods described herein generally relate to techniques for automated detection, aggregation, and integration of cybersecurity threats. The system ingests multiple data feeds which can be in one or numerous different formats. The system evaluates information based on defined scores to display to users threats and risks associated with them. The system also calculates decay rates for expiration of threats and indicators through various methods.

    Automated cybersecurity threat detection with aggregation and analysis

    公开(公告)号:US10902114B1

    公开(公告)日:2021-01-26

    申请号:US16208531

    申请日:2018-12-03

    发明人: Ryan Trost Leon Ward

    摘要: The systems and methods described herein generally relate to techniques for automated detection, aggregation, and integration of cybersecurity threats. The system ingests multiple data feeds which can be in one or numerous different formats. The system evaluates information based on defined scores to display to users threats and risks associated with them. The system also calculates decay rates for expiration of threats and indicators through various methods.