-
公开(公告)号:US20240037254A1
公开(公告)日:2024-02-01
申请号:US17877495
申请日:2022-07-29
Applicant: Cisco Technology, Inc.
Inventor: Marcelo Yannuzzi , Arash Salarian , Herve Muyal , Jean Andrei Diaconu , Jelena Kljujic , Carlos Goncalves Pereira
IPC: G06F21/62 , G06F3/04847 , G06F40/279 , G06F40/166
CPC classification number: G06F21/6209 , G06F3/04847 , G06F40/279 , G06F40/166 , G06Q50/265
Abstract: In one embodiment, a device may extract, from one or more bodies of text, a data usage restriction for a particular type of data. The device may send, to a user interface, the data usage restriction extracted from the one or more bodies of text for presentation for a user. The device may receive, via the user interface, feedback from the user regarding the data usage restriction. The device may generate a data compliance constraint that controls how an application service handles the particular type of data, based on the data usage restriction and the feedback from the user.
-
公开(公告)号:US20250097252A1
公开(公告)日:2025-03-20
申请号:US18470884
申请日:2023-09-20
Applicant: Cisco Technology, Inc.
Inventor: Arash Salarian , Marcelo Yannuzzi , Hendrikus G.P. Bosch , Jeffrey Michael Napper
IPC: H04L9/40
Abstract: Techniques for using real-time metrics and telemetry information to dynamically prioritize attack paths identified during a static analysis of a cloud native application, and using top priority attack paths identified during the static analysis to steer the dynamic analysis. The techniques may include identifying components of the cloud native application and connections between the components. The components and connections are analyzed to identify a set of attack paths. Network communications are monitored between the connections and metrics representing signals in the communications collected. A first subset of the attack paths based on a first portion of the metric indicating a real-time security vulnerability are identified. Finally, the first subset of the attack paths is prioritized over a second subset of the attack paths based at least in part on the first subset having the first portion of the metrics indicating real-time security vulnerabilities.
-