Internet breach correlation
First Claim
1. A method comprising:
- receiving, from a first source, vulnerability data that indicates a set of vulnerabilities of computing assets in a customer network;
receiving, from one or more second sources that are different than the first source, breach data that at least indicates, for a first vulnerability, a first number of breaches that occurred outside the customer network for the first vulnerability, and for a second vulnerability, a second number of breaches that occurred outside the customer network for the second vulnerability;
wherein the breach data indicates a first period of time for the first vulnerability and a second period of time for the second vulnerability;
identifying the first vulnerability within the set of vulnerabilities;
identifying the second vulnerability within the set of vulnerabilities;
determining that the first vulnerability is more vulnerable to a breach than the second vulnerability based on the first number of breaches and the second number of breaches;
causing result data that is based on the first vulnerability and the second vulnerability to be displayed on a screen of a computing device;
wherein the result data includes a plurality of risk scores, wherein each risk score of the plurality of risk scores is associated with one or more computing assets of the computing assets in the customer network;
receiving input that selects a particular risk score of the plurality of risk scores;
in response to receiving the input that selects the particular risk score, displaying a plurality of metrics associated with the particular risk score, wherein the plurality of metrics includes;
a total number of vulnerabilities of the one or more computing assets that are associated with the particular risk score, anda total number of breaches that occurred outside the customer network for the vulnerabilities of the one or more computing assets that are associated with the particular risk score;
wherein the method is performed by one or more computing devices.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.
-
Citations
18 Claims
-
1. A method comprising:
-
receiving, from a first source, vulnerability data that indicates a set of vulnerabilities of computing assets in a customer network; receiving, from one or more second sources that are different than the first source, breach data that at least indicates, for a first vulnerability, a first number of breaches that occurred outside the customer network for the first vulnerability, and for a second vulnerability, a second number of breaches that occurred outside the customer network for the second vulnerability; wherein the breach data indicates a first period of time for the first vulnerability and a second period of time for the second vulnerability; identifying the first vulnerability within the set of vulnerabilities; identifying the second vulnerability within the set of vulnerabilities; determining that the first vulnerability is more vulnerable to a breach than the second vulnerability based on the first number of breaches and the second number of breaches; causing result data that is based on the first vulnerability and the second vulnerability to be displayed on a screen of a computing device; wherein the result data includes a plurality of risk scores, wherein each risk score of the plurality of risk scores is associated with one or more computing assets of the computing assets in the customer network; receiving input that selects a particular risk score of the plurality of risk scores; in response to receiving the input that selects the particular risk score, displaying a plurality of metrics associated with the particular risk score, wherein the plurality of metrics includes; a total number of vulnerabilities of the one or more computing assets that are associated with the particular risk score, and a total number of breaches that occurred outside the customer network for the vulnerabilities of the one or more computing assets that are associated with the particular risk score; wherein the method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. One or more non-transitory computer-readable media storing instructions which, when executed by one or more processors, cause:
-
receiving, from a first source, vulnerability data that indicates a set of vulnerabilities of computing assets in a customer network; receiving, from one or more second sources that are different than the first source, breach data that at least indicates, for a first vulnerability, a first number of breaches that occurred outside the customer network for the first vulnerability, and for a second vulnerability, a second number of breaches that occurred outside the customer network for the second vulnerability; wherein the breach data indicates a first period of time for the first vulnerability and a second period of time for the second vulnerability; identifying the first vulnerability within the set of vulnerabilities; identifying the second vulnerability within the set of vulnerabilities; determining that the first vulnerability is more vulnerable to a breach than the second vulnerability based on the first number of breaches and the second number of breaches; causing result data that is based on the first vulnerability and the second vulnerability to be displayed on a screen of a computing device; wherein the result data includes a plurality of risk scores, wherein each risk score of the plurality of risk scores is associated with one or more computing assets of the computing assets in the customer network; receiving input that selects a particular risk score of the plurality of risk scores; in response to receiving the input that selects the particular risk score, displaying a plurality of metrics associated with the particular risk score, wherein the plurality of metrics includes; a total number of vulnerabilities of the one or more computing assets that are associated with the particular risk score, and a total number of breaches that occurred outside the customer network for the vulnerabilities of the one or more computing assets that are associated with the particular risk score. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
one or more processors; one or more computer-readable media storing instructions which, when executed by the one or more processors, cause; receiving, from a first source, vulnerability data that indicates a set of vulnerabilities of computing assets in a customer network; receiving, from one or more second sources that are different than the first source, breach data that at least indicates, for a first vulnerability, a first number of breaches that occurred outside the customer network for the first vulnerability, and for a second vulnerability, a second number of breaches that occurred outside the customer network for the second vulnerability; wherein the breach data indicates a first period of time for the first vulnerability and a second period of time for the second vulnerability; identifying the first vulnerability within the set of vulnerabilities; identifying the second vulnerability within the set of vulnerabilities; determining that the first vulnerability is more vulnerable to a breach than the second vulnerability based on the first number of breaches and the second number of breaches; causing result data that is based on the first vulnerability and the second vulnerability to be displayed on a screen of a computing device; wherein the result data includes a plurality of risk scores, wherein each risk score of the plurality of risk scores is associated with one or more computing assets of the computing assets in the customer network; receiving input that selects a particular risk score of the plurality of risk scores; in response to receiving the input that selects the particular risk score, displaying a plurality of metrics associated with the particular risk score, wherein the plurality of metrics includes; a total number of vulnerabilities of the one or more computing assets that are associated with the particular risk score, and a total number of breaches that occurred outside the customer network for the vulnerabilities of the one or more computing assets that are associated with the particular risk score. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification