Wiz, Inc. (20240244065). TECHNIQUES FOR CYBERSECURITY INSPECTION BASED ON RUNTIME DATA AND STATIC ANALYSIS FROM CLONED RESOURCES simplified abstract

From WikiPatents
Jump to navigation Jump to search

TECHNIQUES FOR CYBERSECURITY INSPECTION BASED ON RUNTIME DATA AND STATIC ANALYSIS FROM CLONED RESOURCES

Organization Name

Wiz, Inc.

Inventor(s)

Daniel Hershko Shemesh of Givat-Shmuel (IL)

Yarin Miran of Rishon Lezion (IL)

Roy Reznik of Tel Aviv (IL)

Ami Luttwak of Binyamina (IL)

Yinon Costica of Tel Aviv (IL)

Aviel Fogel of Tel Aviv (IL)

Udi Reitblat of Tel Aviv (IL)

Alon Schindel of Tel Aviv (IL)

TECHNIQUES FOR CYBERSECURITY INSPECTION BASED ON RUNTIME DATA AND STATIC ANALYSIS FROM CLONED RESOURCES - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240244065 titled 'TECHNIQUES FOR CYBERSECURITY INSPECTION BASED ON RUNTIME DATA AND STATIC ANALYSIS FROM CLONED RESOURCES

Simplified Explanation:

The patent application describes a system and method for detecting cybersecurity risks on a resource in a computing environment by combining static analysis of a cloned resource with runtime data from the live resource.

  • Configuring a resource in a computing environment to deploy a sensor for detecting runtime data.
  • Generating an inspectable disk based on the original disk of the resource.
  • Initiating inspection based on the detected runtime data to identify cybersecurity objects on the inspectable disk.
  • Detecting cybersecurity objects on the inspectable disk.
  • Initiating mitigation actions on the resource based on the detected cybersecurity objects.

Key Features and Innovation:

  • Utilizes static analysis of a cloned resource and runtime data from the live resource.
  • Configures a sensor on the resource to detect runtime data.
  • Generates an inspectable disk for inspection based on runtime data.
  • Identifies cybersecurity objects on the inspectable disk.
  • Initiates mitigation actions on the resource based on detected cybersecurity objects.

Potential Applications:

This technology can be applied in various industries such as cybersecurity, IT security, network security, and data protection.

Problems Solved:

This technology addresses the need for proactive cybersecurity risk detection and mitigation in computing environments.

Benefits:

  • Enhances cybersecurity risk detection capabilities.
  • Improves response time to cybersecurity threats.
  • Helps in preventing potential cyber attacks.

Commercial Applications:

Potential commercial applications include cybersecurity software development, IT security consulting services, and network security solutions for businesses.

Questions about Cybersecurity Risk Detection Technology:

1. How does this technology improve cybersecurity risk detection in computing environments? 2. What are the key components of the system for detecting cybersecurity risks?


Original Abstract Submitted

a system and method for detecting cybersecurity risk on a resource in a computing environment utilizes static analysis of a cloned resource and runtime data from the live resource. the method includes: configuring a resource deployed in a computing environment to deploy thereon a sensor, the sensor configured to detect runtime data; detecting runtime data from the sensor of the resource; generating an inspectable disk based on an original disk of the resource; initiating inspection based on the detected runtime data for a cybersecurity object on the inspectable disk; detecting the cybersecurity object on an inspectable disk; and initiating a mitigation action on the resource.