Cyber-security system and methods thereof
First Claim
Patent Images
1. A method for adaptively securing a protected entity against cyber-threats, comprising:
- activating a security application configured to handle a cyber-threat;
receiving a plurality of feeds during a runtime of the security application;
analyzing the plurality of received feeds to determine if the security application is required to be re-programmed to perform an optimized action to efficiently protect against the cyber-threat; and
re-programming, during the runtime, the security application, when it is determined that the security application requires performance of the optimized action;
wherein the optimized action includes at least a mitigation action.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for adaptively securing a protected entity against cyber-threats. The method includes: activating a security application configured to handle a cyber-threat; receiving a plurality of feeds during a runtime of the security application; analyzing the plurality of received feeds to determine if the security application is required to be re-programmed to perform an optimized action to efficiently protect against the cyber-threat; and re-programming, during the runtime, the security application, when it is determined that the security application requires performance of the optimized action.
42 Citations
29 Claims
-
1. A method for adaptively securing a protected entity against cyber-threats, comprising:
-
activating a security application configured to handle a cyber-threat; receiving a plurality of feeds during a runtime of the security application; analyzing the plurality of received feeds to determine if the security application is required to be re-programmed to perform an optimized action to efficiently protect against the cyber-threat; and re-programming, during the runtime, the security application, when it is determined that the security application requires performance of the optimized action; wherein the optimized action includes at least a mitigation action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium having stored thereon instructions for causing a processing circuitry to execute a process for adaptively securing a protected entity against cyber-threats, the process comprising:
-
activating a security application configured to handle a cyber-threat; receiving a plurality of feeds during a runtime of the security application; analyzing the plurality of received feeds to determine if the security application is required to be re-programmed to perform an optimized action to efficiently protect against the cyber-threat; and re-programming, during the runtime, the security application, when it is determined that the security application requires performance of the optimized action; wherein the optimized action includes at least a mitigation action.
-
-
16. A system for adaptively securing a protected entity against cyber-threats, comprising:
-
a processing circuitry; and a memory, the memory containing instructions that, when executed by the processing circuitry, configure the system to; activate a security application configured to handle a cyber-threat; receive a plurality of feeds during a runtime of the security application; analyze the plurality of received feeds to determine if the security application is required to be re-programmed to perform an optimized action to efficiently protect against the cyber-threat; and re-program, during the runtime, the security application, when it is determined that the security application requires performance of the optimized action; wherein the optimized action includes at least a mitigation action. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification