×

Identifying vulnerabilities of computing assets based on breach data

  • US 9,270,695 B2
  • Filed: 03/09/2015
  • Issued: 02/23/2016
  • Est. Priority Date: 02/14/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, from a first source, vulnerability data that indicates a set of vulnerabilities of computing assets in a customer network;

    receiving, from one or more second sources that are different than the first source, breach data that indicates a set of successful exploits that occurred outside the customer network;

    identifying, based on the breach data, a subset of the set of vulnerabilities that are most vulnerable to a successful exploit;

    causing result data that identifies the subset to be displayed on a screen of a computing device;

    wherein the method is performed by one or more computing devices.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×