Musarubra US LLC (20240348628). CYBERSECURITY INVESTIGATION TOOLS UTILIZING INFORMATION GRAPHS simplified abstract

From WikiPatents
Jump to navigation Jump to search

CYBERSECURITY INVESTIGATION TOOLS UTILIZING INFORMATION GRAPHS

Organization Name

Musarubra US LLC

Inventor(s)

Gabriel G. Infante-lopez of Cordoba (AR)

Hemang Satish Nadkarni of Cupertino CA (US)

Pablo Andres Michelis of San Jose CA (US)

Francisco Matias Cuenca-acuna of Cordoba (AR)

Matias L. Marenchino of Cordoba (AR)

Maria Torino of Cordoba (AR)

CYBERSECURITY INVESTIGATION TOOLS UTILIZING INFORMATION GRAPHS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240348628 titled 'CYBERSECURITY INVESTIGATION TOOLS UTILIZING INFORMATION GRAPHS

Simplified Explanation: The patent application describes an apparatus that links data from cybersecurity tools to create an information graph, detect patterns, and update the graph based on known cyberattack techniques.

Key Features and Innovation:

  • Apparatus iteratively links data from cybersecurity tools based on a graph schema.
  • Generates an information graph.
  • Presents detected patterns in the information graph.
  • Updates the graph based on data from cybersecurity tools selected using known cyberattack techniques.

Potential Applications: This technology can be used in:

  • Cybersecurity operations
  • Threat detection and analysis
  • Incident response

Problems Solved:

  • Enhances the efficiency of analyzing cybersecurity data
  • Improves the detection of cyber threats
  • Helps in identifying and responding to cyberattacks

Benefits:

  • Streamlines cybersecurity processes
  • Increases the accuracy of threat detection
  • Enhances overall cybersecurity posture

Commercial Applications: Title: Advanced Cybersecurity Threat Detection and Analysis System This technology can be utilized by:

  • Cybersecurity companies
  • Government agencies
  • Financial institutions

Prior Art: Researchers can explore prior patents related to cybersecurity data analysis and threat detection systems.

Frequently Updated Research: Stay informed about the latest advancements in cybersecurity threat detection and analysis systems.

Questions about Cybersecurity Threat Detection and Analysis: 1. How does the apparatus in the patent application improve cybersecurity operations? 2. What are the key advantages of using known cyberattack techniques to update the information graph?


Original Abstract Submitted

example apparatus disclosed herein iteratively link data from one or more cybersecurity tools based on a graph schema to generate an information graph. disclosed example apparatus also cause presentation of a first pattern detected in the information graph. disclosed example apparatus further update the information graph based on data from at least one of the cybersecurity tools, the at least one of the cybersecurity tools selected based on a second pattern, the second pattern associated with a known cyberattack technique.