|
Found results for
patents
1.
|
SYSTEM AND METHOD FOR SELECTION AND DISCOVERY OF VULNERABLE SOFTWARE PACKAGES
Application Number |
IB2022050099 |
Publication Number |
2022/149088 |
Status |
In Force |
Filing Date |
2022-01-06 |
Publication Date |
2022-07-14 |
Owner |
TWISTLOCK, LTD. (Israel)
|
Inventor |
- Levin, Liron
- Adler, Alon
- Kletselman, Michael
- Stopel, Dima
|
Abstract
A system and method for discovering vulnerabilities in software packages. A method includes identifying at least one potential source of vulnerability in at least one potentially vulnerable software package of a plurality of software packages, wherein each potential source of vulnerability is a change to one of the at least one potentially vulnerable software package; and identifying at least one vulnerability in the plurality of software packages by selecting and applying at least one vulnerability identification rule to data of each of the at least one potentially vulnerable software package, wherein the at least one vulnerability identification rule for each of the at least one potentially vulnerable software package is selected based on an availability of version identifiers for the potentially vulnerable software package.
IPC Classes ?
- H04L 9/40 - Network security protocols
- G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F 8/71 - Version control ; Configuration management
|
2.
|
SYSTEM AND METHOD FOR PROVIDING CONTEXTUAL FORENSIC DATA FOR USER ACTIVITY-RELATED SECURITY INCIDENTS
Application Number |
IB2020055084 |
Publication Number |
2020/240473 |
Status |
In Force |
Filing Date |
2020-05-28 |
Publication Date |
2020-12-03 |
Owner |
TWISTLOCK, LTD. (Israel)
|
Inventor |
- Levin, Liron
- Kletselman, Michael
- Bizamcher, Ami
- Stopel, Dima
- Morello, John
|
Abstract
Techniques for providing contextual forensic data based on user activities. A first method includes identifying a user action in user activity data, wherein the user action is a discrete event initiated by a user, wherein the user action is performed with respect to a portion of a system; and correlating the identified user action with at least one system change, wherein the at least one system change is related to the portion of the system, wherein the at least one system change occurred after the user action. A second method includes taking a first snapshot before a user action occurs, wherein the user action is a discrete event initiated by a user, wherein the first snapshot is taken of at least a portion of a system; and taking a second snapshot after the user action occurs, wherein the second snapshot is taken of the at least a portion of the system.
IPC Classes ?
- G06F 21/55 - Detecting local intrusion or implementing counter-measures
- G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
|
|