|
2025
|
Invention
|
Techniques for mounting disks in an inspection environment.
A system and method for assembling a... |
|
|
Invention
|
Detecting vulnerabilities in configuration code of a cloud environment utilizing infrastructure a... |
|
|
Invention
|
Techniques for validating a virtual workload signature from a software repository.
In some imple... |
|
|
Invention
|
Techniques for analyzing external exposure in cloud environments.
A system and method for perfor... |
|
|
Invention
|
System and method for private registry cybersecurity inspection.
A system and method for cyberse... |
|
|
Invention
|
Techniques for fixing configuration and for fixing code using contextually enriched alerts.
Syst... |
|
|
Invention
|
Cyber attribution of software containers.
A system and method for software containers attributio... |
|
|
Invention
|
Techniques for code fingerprinting. A system and method for code fingerprinting. A method include... |
|
|
Invention
|
System and method for improving efficiency in natural language query processing utilizing languag... |
|
|
Invention
|
System and method for detecting lateral movement using cloud access keys.
A system and method fo... |
|
|
Invention
|
Lateral movement analysis using certificate private keys.
A system and method for detecting pote... |
|
|
Invention
|
System and method for detecting lateral movement using ssh private keys.
A system and method for... |
|
|
Invention
|
Techniques for detecting artificial intelligence model cybersecurity risk in a computing environm... |
|
|
Invention
|
Technique and method for detection and display of the cybersecurity risk context of a cloud envir... |
|
|
Invention
|
Techniques for detecting sensitive data in cloud computing environments utilizing cloning.
A sys... |
|
|
Invention
|
Detecting vulnerabilities in virtual instances in a cloud environment utilizing infrastructure as... |
|
|
Invention
|
System and method for applying a policy on a network path.
A system and method for applying a po... |
|
|
Invention
|
Detection of stale data objects and associated cybersecurity risk. A system and method for detect... |
|
|
Invention
|
Unified inspection techniques based on abstracted compute type.
A system and method for inspecti... |
|
|
Invention
|
Techniques for detecting cloud identity misuse leveraging runtime context.
A system and method f... |
|
|
Invention
|
System and method for detecting cybersecurity risks in managed artificial intelligence models.
A... |
|
|
Invention
|
System and method for cybersecurity threat detection utilizing static and runtime data.
A system... |
|
|
Invention
|
Cybersecurity threat detection utilizing unified identity mapping and permission detection.
A sy... |
|
|
Invention
|
Static analysis techniques for determining reachability properties of network and computing objec... |
|
|
Invention
|
Techniques for detecting resources without authentication using exposure analysis.
A system and ... |
|
|
Invention
|
Techniques for semantic analysis of cybersecurity event data and remediation of cybersecurity eve... |
|
|
Invention
|
System and method for agentless application inventory detection.
A system and method for agentle... |
|
|
Invention
|
Efficient representation of multiple cloud computing environments through unified identity mappin... |
|
|
Invention
|
Detecting malware infection path in a cloud computing environment utilizing a security graph.
A ... |
|
|
Invention
|
System and method for disk inspection utilizing disk cloning techniques.
A system and method for... |
|
|
Invention
|
System and method for agentless host configuration detection in a computing environment.
A syste... |
|
|
P/S
|
Downloadable software and downloadable software applications for use in the field of cloud-securi... |
|
|
P/S
|
Business advisory and business consultancy services in the field of cloud-security and cybersecur... |
|
|
P/S
|
Downloadable software and downloadable software applications
for use in the field of cloud-secur... |
|
2024
|
Invention
|
Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context.
A ... |
|
|
Invention
|
Techniques for risk and constraint-based inspection. A system and method for risk and constraint-... |
|
|
Invention
|
Cybersecurity root cause analysis using computing resource name correlation. A system and method ... |
|
|
Invention
|
System and method for scanning private code and ci/cd registries. A system and method for inspect... |
|
|
Invention
|
Techniques for cross-source alert prioritization and remediation.
A system and method for alert ... |
|
|
Invention
|
System and method for tracing cloud computing environment deployments to code objects utilizing u... |
|
|
Invention
|
Application endpoint cybersecurity techniques.
A system and method for application endpoint vali... |
|
|
Invention
|
Techniques for detecting ai pipelines in cloud computing environments.
A system and method detec... |
|
|
Invention
|
System and method for near-real time cloud security posture management.
A system and method for ... |
|
|
Invention
|
System and method for generating cybersecurity remediation in computing environments.
A system a... |
|
|
Invention
|
Cybersecurity vulnerability validation techniques utilizing runtime data, static analysis and dyn... |
|
|
Invention
|
Techniques for code fingerprinting.
A system and method for code fingerprinting. A method includ... |
|
|
Invention
|
System and method for private registry cybersecurity inspection. A system and method for cybersec... |
|
2023
|
Invention
|
Techniques for signatureless virtual instance image verification in cloud computing environments.... |
|
|
Invention
|
System and method for providing security posture management for ai applications.
A system and me... |
|
2022
|
P/S
|
Downloadable software for development and deployment of cloud software applications for cyber sec... |
|
2021
|
Invention
|
System and method for generating a partitioned view of a security graph in a cloud computing envi... |
|
|
P/S
|
Downloadable software for development and deployment of
cloud software applications for cyber se... |
|
2020
|
P/S
|
Downloadable software for deployment of cloud software applications for cyber security; Downloada... |