Ranking security scans based on vulnerability information from third party resources
Abstract:
A computer-implemented method improves a computer system's security. A description of real-time trends, for multiple computer security issues from a third party resource is associated with multiple security routines for a computer system. The multiple security routines are sorted according to the real-time trends, such that the sorting establishes an order of priority for running each of the multiple security routines based on the real-time trends. A percentage of sorted security routines to execute on the computer system is executed in their order of priority to identify one or more computer security issues for the computer system. One or more processors then execute a resolution program to resolve the one or more computer security issues that are identified for the computer system.
Information query
Patent Agency Ranking
0/0