US 12,483,586 B1
Contextual vulnerability management
Ryan Nicholas Lait, Camp Hill (AU); and Dean Victor Luxton, Redcliffe (AU)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Jan. 30, 2024, as Appl. No. 18/427,603.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) 20 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
obtaining, by an enterprise security application, a vulnerability report generated by a vulnerability scanner, wherein the vulnerability report is indicative of a detected vulnerability associated with a computing resource utilized within an information technology (IT) environment;
identifying, by the enterprise security application via a security information and event management (SIEM) data store, one or more of asset data or activity data of the IT environment associated with the computing resource;
causing display, by the enterprise security application, of a graphical user interface (GUI) indicative of a vulnerability and identifying the asset data or the activity data; and
modifying a risk score associated with the vulnerability.