US 11,790,091 B2
Monitoring information-security coverage to identify an exploitable weakness in the information-securing coverage
Stuart Sloan, Huntersville, NC (US); Aleksey Vladimirovich Rogozhin, Cary, NC (US); Glenn Bernstein, Durham, NC (US); and Jesse Daniel Bikman, Durham, NC (US)
Assigned to Truist Bank, Charlotte, NC (US)
Filed by Truist Bank, Charlotte, NC (US)
Filed on Dec. 2, 2022, as Appl. No. 18/74,070.
Application 18/074,070 is a continuation of application No. 17/145,713, filed on Jan. 11, 2021, granted, now 11,544,386.
Application 17/145,713 is a continuation of application No. 16/047,151, filed on Jul. 27, 2018, granted, now 10,922,419.
Claims priority of provisional application 62/537,515, filed on Jul. 27, 2017.
Prior Publication US 2023/0101394 A1, Mar. 30, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/57 (2013.01); G06F 21/60 (2013.01); G06F 16/28 (2019.01)
CPC G06F 21/577 (2013.01) [G06F 16/285 (2019.01); G06F 21/604 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, by a processing device, information-security data that indicates information-security activity detected in a computing environment by one or more information-security measurement modules;
determining, by the processing device, a plurality of information-security metrics based on the information-security data; and
generating, by the processing device, an interactive user interface for display that includes the plurality of information-security metrics categorized into one or more groups, the interactive user interface being usable by a user for improving a security level of the computing environment.