Unknown Organization (20240223582). SYSTEMS AND METHODS FOR INTELLIGENTLY GENERATING CYBERSECURITY CONTEXTUAL INTELLIGENCE AND GENERATING A CYBERSECURITY INTELLIGENCE INTERFACE simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR INTELLIGENTLY GENERATING CYBERSECURITY CONTEXTUAL INTELLIGENCE AND GENERATING A CYBERSECURITY INTELLIGENCE INTERFACE

Organization Name

Unknown Organization

Inventor(s)

Patrick Duffy of Annandale VA (US)

Kelsey Mitchell of Arlington VA (US)

Peter Silberman of Rockville MD (US)

SYSTEMS AND METHODS FOR INTELLIGENTLY GENERATING CYBERSECURITY CONTEXTUAL INTELLIGENCE AND GENERATING A CYBERSECURITY INTELLIGENCE INTERFACE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240223582 titled 'SYSTEMS AND METHODS FOR INTELLIGENTLY GENERATING CYBERSECURITY CONTEXTUAL INTELLIGENCE AND GENERATING A CYBERSECURITY INTELLIGENCE INTERFACE

The patent application describes a system and method for customizing cybersecurity microservices to enhance cybersecurity threat mitigation for individual subscribers.

  • Construct a unique data corpus for each subscriber containing relevant computing environment data.
  • Adapt a general cybersecurity microservice to a subscriber-specific microservice by creating context-informed event handling instructions.
  • Enhance the microservice with the new event handling instructions.
  • Calculate a threat severity level for specific cybersecurity events based on the context-informed instructions.
  • Take appropriate threat mitigation actions based on the calculated threat severity level.

Potential Applications: - Customized cybersecurity solutions for individual subscribers. - Enhanced threat detection and mitigation capabilities. - Improved cybersecurity incident response times.

Problems Solved: - Tailoring cybersecurity measures to individual subscriber needs. - Enhancing the effectiveness of threat mitigation strategies. - Streamlining cybersecurity incident response processes.

Benefits: - Increased cybersecurity effectiveness. - Customized protection for individual subscribers. - Efficient threat mitigation actions.

Commercial Applications: Title: Customized Cybersecurity Solutions for Enhanced Threat Mitigation Description: This technology can be applied in industries such as finance, healthcare, and government to provide tailored cybersecurity solutions for improved threat mitigation and incident response.

Questions about the technology: 1. How does this technology improve cybersecurity threat mitigation for individual subscribers? 2. What are the key advantages of customizing cybersecurity microservices for different subscribers?


Original Abstract Submitted

a system and method for adapting one or more cybersecurity microservices to accelerate cybersecurity threat mitigation includes constructing a subscriber-specific data corpus comprising a plurality of distinct pieces of computing environment-informative data of a target subscriber; adapting a subscriber-agnostic microservice of the cybersecurity service to a subscriber-specific microservice, wherein: the subscriber-agnostic microservice includes a plurality of subscriber-agnostic cybersecurity event handling instructions, and adapting the subscriber-agnostic microservice to the subscriber-specific microservice includes generating a plurality of context-informed cybersecurity event handling instructions; augmenting the subscriber-agnostic microservice to include the plurality of context-informed cybersecurity event handling instructions; computing for a target cybersecurity event a subscriber-specific threat severity level based on one or more of the plurality of context-informed cybersecurity event handling instructions; executing, by one or more computers, a threat mitigation action or threat disposal action based on the computing of the subscriber-specific threat severity level for the target cybersecurity event.