SG10201912351QA - Continuous vulnerability management for modern applications - Google Patents
Continuous vulnerability management for modern applicationsInfo
- Publication number
- SG10201912351QA SG10201912351QA SG10201912351QA SG10201912351QA SG10201912351QA SG 10201912351Q A SG10201912351Q A SG 10201912351QA SG 10201912351Q A SG10201912351Q A SG 10201912351QA SG 10201912351Q A SG10201912351Q A SG 10201912351QA SG 10201912351Q A SG10201912351Q A SG 10201912351QA
- Authority
- SG
- Singapore
- Prior art keywords
- vulnerability management
- modern applications
- continuous vulnerability
- continuous
- modern
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/259,960 US11481498B2 (en) | 2019-01-28 | 2019-01-28 | Continuous vulnerability management for modern applications |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201912351QA true SG10201912351QA (en) | 2020-08-28 |
Family
ID=69326399
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201912351QA SG10201912351QA (en) | 2019-01-28 | 2019-12-17 | Continuous vulnerability management for modern applications |
Country Status (4)
Country | Link |
---|---|
US (1) | US11481498B2 (en) |
EP (1) | EP3693874B1 (en) |
CN (1) | CN111488578A (en) |
SG (1) | SG10201912351QA (en) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11960609B2 (en) * | 2019-10-21 | 2024-04-16 | Snyk Limited | Package dependencies representation |
US11100239B2 (en) | 2019-05-06 | 2021-08-24 | Sap Se | Open source library security rating |
US11210404B2 (en) * | 2019-06-14 | 2021-12-28 | Netiq Corporation | Blockchain-based state verifications of software component vulnerability database for software products |
US11422917B2 (en) * | 2019-07-26 | 2022-08-23 | Red Hat, Inc. | Deriving software application dependency trees for white-box testing |
US11704414B2 (en) | 2020-04-29 | 2023-07-18 | Jpmorgan Chase Bank, N.A. | Systems and methods for managing vulnerability data |
US11470159B2 (en) * | 2020-08-28 | 2022-10-11 | Cisco Technology, Inc. | API key security posture scoring for microservices to determine microservice security risks |
US20220083667A1 (en) * | 2020-09-16 | 2022-03-17 | At&T Intellectual Property I, L.P. | Open Source Software Security Vulnerability Prioritization Scheme |
US20220156383A1 (en) * | 2020-09-17 | 2022-05-19 | Dynatrace Llc | Method And System For Real Time Detection And Prioritization Of Computing Assets Affected By Publicly Known Vulnerabilities Based On Topological And Transactional Monitoring Data |
EP4226240A1 (en) * | 2020-10-09 | 2023-08-16 | Conektto, Inc. | Natural language processing of api specifications for automatic artifact generation |
CN112416757B (en) * | 2020-11-03 | 2021-11-12 | 前海飞算云智软件科技(深圳)有限公司 | Component development method, device, storage medium and electronic equipment |
CN112434305B (en) * | 2020-12-07 | 2024-03-08 | 北京中科微澜科技有限公司 | Patch-based vulnerability detection method and device, storage medium and electronic equipment |
CN113139192B (en) * | 2021-04-09 | 2024-04-19 | 扬州大学 | Third party library security risk analysis method and system based on knowledge graph |
CN113360955A (en) * | 2021-06-16 | 2021-09-07 | 深圳市雪球科技有限公司 | Applet management method and device and server |
US11831688B2 (en) * | 2021-06-18 | 2023-11-28 | Capital One Services, Llc | Systems and methods for network security |
US20230036739A1 (en) * | 2021-07-28 | 2023-02-02 | Red Hat, Inc. | Secure container image builds |
US11775290B2 (en) * | 2021-08-06 | 2023-10-03 | Fujitsu Limited | Detection of API backward compatibility across software versions |
US11893116B2 (en) | 2021-08-19 | 2024-02-06 | Bank Of America Corporation | Assessment plug-in system for providing binary digitally signed results |
US11805017B2 (en) | 2021-08-19 | 2023-10-31 | Bank Of America Corporation | Systems and methods for identifying and determining third party compliance |
US11546218B1 (en) | 2021-08-30 | 2023-01-03 | Bank Of America Corporation | Systems and methods for bi-directional machine-learning (ML)-based network compatibility engine |
WO2023038957A1 (en) * | 2021-09-08 | 2023-03-16 | Lacework, Inc. | Monitoring a software development pipeline |
CN116028057A (en) * | 2021-10-27 | 2023-04-28 | 北京字节跳动网络技术有限公司 | Code management method and device |
CN114143110B (en) * | 2021-12-08 | 2024-04-26 | 湖北天融信网络安全技术有限公司 | Vulnerability processing method, device and system of mimicry equipment |
US20230237158A1 (en) * | 2022-01-24 | 2023-07-27 | Dell Products L.P. | Method and system for detecting vulnerabilities of an installed application before a computing device gets affected |
CN115220765A (en) * | 2022-03-08 | 2022-10-21 | 洪兴发 | Vulnerability supplementary repair analysis method and system based on big data vulnerability analysis |
CN117131514B (en) * | 2023-10-25 | 2024-04-09 | 中汽智联技术有限公司 | Internet of vehicles supply chain security vulnerability early warning method, system and storage medium |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1739552A1 (en) * | 2005-06-21 | 2007-01-03 | Hewlett-Packard Development Company, L.P. | Software installation method and computer system |
JP4722730B2 (en) | 2006-03-10 | 2011-07-13 | 富士通株式会社 | Security management program, security management device, and security management method |
KR101478134B1 (en) * | 2012-02-29 | 2015-01-26 | 주식회사 팬택 | File management method for mobile device and mobile device using thereof |
CN105989283B (en) * | 2015-02-06 | 2019-08-09 | 阿里巴巴集团控股有限公司 | A kind of method and device identifying virus mutation |
US10614223B2 (en) | 2015-05-28 | 2020-04-07 | Micro Focus Llc | Security vulnerability detection |
US9703961B2 (en) * | 2015-06-05 | 2017-07-11 | Accenture Global Services Limited | Process risk classification |
US10277620B2 (en) * | 2016-09-08 | 2019-04-30 | Corax Cyber Security, Inc. | Determining an assessment of a security breach for an asset of a network infrastructure |
WO2018085732A1 (en) * | 2016-11-03 | 2018-05-11 | RiskIQ, Inc. | Techniques for detecting malicious behavior using an accomplice model |
US10678513B2 (en) * | 2017-09-12 | 2020-06-09 | Devfactory Fz-Llc | Library upgrade method, apparatus, and system |
-
2019
- 2019-01-28 US US16/259,960 patent/US11481498B2/en active Active
- 2019-12-17 SG SG10201912351QA patent/SG10201912351QA/en unknown
-
2020
- 2020-01-17 CN CN202010051878.3A patent/CN111488578A/en active Pending
- 2020-01-27 EP EP20153839.4A patent/EP3693874B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20200242254A1 (en) | 2020-07-30 |
CN111488578A (en) | 2020-08-04 |
EP3693874A1 (en) | 2020-08-12 |
EP3693874B1 (en) | 2022-10-19 |
US11481498B2 (en) | 2022-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG10201912351QA (en) | Continuous vulnerability management for modern applications | |
GB2614141B (en) | Firmware management for IoT devices | |
IL288030B (en) | Rate-optimized congestion management | |
SG11202010075XA (en) | Multi-uav management | |
SG11202107072VA (en) | Blockchain management system | |
GB201902167D0 (en) | Communications systems | |
SG11202108335RA (en) | Management system | |
EP3806253C0 (en) | Cable management systems | |
IL292873A (en) | Spatio-temporal-interactive networks | |
EP3931088C0 (en) | Thermal management system | |
ZA202110088B (en) | Environmental management system | |
PL3909180T3 (en) | Scell management for ca | |
GB2585010B (en) | Cryptocurrency key management | |
SG11202109749QA (en) | Access right management | |
GB2581795B (en) | Thermal management system | |
GB201900480D0 (en) | Network management | |
EP3881646A4 (en) | Trace management | |
EP4085145A4 (en) | Guided excision-transposition systems | |
GB201905355D0 (en) | Vehicle-distributed asset management | |
SG11202110786SA (en) | Cryptographic systems | |
GB2582653B (en) | Cooling arrangement | |
GB201909003D0 (en) | Anonymization | |
SG11202111108PA (en) | Management system | |
GB2612918B (en) | Firmware management for IOT devices | |
GB2582281B (en) | Vehicle management |