About
Transformative Go-to-Market Executive with a proven track record of driving exponential…
Articles by Brian
Activity
-
This will be FUN! April 8, 2pm join us Kevin Dreyer, June Leung and ,Gennady Duchovich, as Moderator ( happy to be on the other side) for an…
This will be FUN! April 8, 2pm join us Kevin Dreyer, June Leung and ,Gennady Duchovich, as Moderator ( happy to be on the other side) for an…
Liked by Brian Laing
-
Can't wait to see some of you at next week's National Cyber Security Show, where I'll be delivering two talks on how we can Harness Mindfulness to…
Can't wait to see some of you at next week's National Cyber Security Show, where I'll be delivering two talks on how we can Harness Mindfulness to…
Liked by Brian Laing
-
We did it! Some milestones deserve a bit of noise. A year ago, Michael Sutton and I announced the launch of Runtime Ventures. Today, I’m proud and…
We did it! Some milestones deserve a bit of noise. A year ago, Michael Sutton and I announced the launch of Runtime Ventures. Today, I’m proud and…
Liked by Brian Laing
Experience
Licenses & Certifications
Patents
-
Methods and apparatus for prioritization of remediation techniques for network security risks
Issued US 8,132,260
A method for a computer system includes receiving a topology of a network including a server location and a threat server at a threat server location, determining a vulnerability security risk for the server location, determining remediation actions including a first action and a second action in response to the vulnerability, determining updated security risks associated with the server location including an first updated security risk for a first action and a second updated security risk for,…
A method for a computer system includes receiving a topology of a network including a server location and a threat server at a threat server location, determining a vulnerability security risk for the server location, determining remediation actions including a first action and a second action in response to the vulnerability, determining updated security risks associated with the server location including an first updated security risk for a first action and a second updated security risk for, and displaying a prioritized list of remediation actions on the display, wherein the first remediation action is prioritized over the second remediation action when the first updated security risk value with respect to the security risk value shows a greater improvement in risk than the second updated security risk value with respect to the security risk value.
-
Network security visualization methods, apparatus and graphical user interfaces
Issued US 7,890,869
A method for a computer system including a display includes determining a plurality of security metrics associated with a plurality of servers within a network, displaying a tree map on the display representing at least a portion of the network, wherein the tree map comprises a plurality of shapes associated with servers from the plurality of servers, wherein a size of shapes in the plurality of shapes are determined in response to a first security metric from the plurality of security metric…
A method for a computer system including a display includes determining a plurality of security metrics associated with a plurality of servers within a network, displaying a tree map on the display representing at least a portion of the network, wherein the tree map comprises a plurality of shapes associated with servers from the plurality of servers, wherein a size of shapes in the plurality of shapes are determined in response to a first security metric from the plurality of security metric associated with the servers, and wherein an appearance of the shapes are determined in response to a second security metric from the plurality of security metrics associated with the servers.
-
Methods and apparatus for determining network risk based upon incomplete network configuration data
Issued US 8307444
A method for a computer system includes receiving configuration data from a network device in a network, determining a topology for a portion of the network from the configuration data, wherein the topology indicates a server location and a threat server at a threat server location in the network, determining a vulnerability including vulnerability attributes for the first server location, and when configuration data for the first server location is incomplete, the method includes determining a…
A method for a computer system includes receiving configuration data from a network device in a network, determining a topology for a portion of the network from the configuration data, wherein the topology indicates a server location and a threat server at a threat server location in the network, determining a vulnerability including vulnerability attributes for the first server location, and when configuration data for the first server location is incomplete, the method includes determining a security exposure of the first server location with respect to the threat server in response to the configuration data, the topology, and to the configuration data associated the host server location, determining a vulnerability certainty for the first server location with respect the vulnerability in response to the configuration data associated the host server location, and outputting a visual representation of the security exposure and the vulnerability certainty on a display
-
Adaptive risk analysis methods and apparatus
Issued US 8321944
A computer system method includes receiving a network topology and associated configuration data, wherein the network topology indicates a host location and a threat location, determining a vulnerability associated with the host location, determining a security exposure for the host location with respect to the threat location from the configuration data, the network topology, and to incomplete configuration data for the host location, determining a first vulnerability certainty for the host…
A computer system method includes receiving a network topology and associated configuration data, wherein the network topology indicates a host location and a threat location, determining a vulnerability associated with the host location, determining a security exposure for the host location with respect to the threat location from the configuration data, the network topology, and to incomplete configuration data for the host location, determining a first vulnerability certainty for the host location with respect the vulnerability in response to incomplete configuration data, thereafter receiving updated network data selected from a group consisting of: updated configuration data, updated network topology, determining an updated security exposure for the host location with respect to the threat location from the updated network data, and to the incomplete configuration data, and displaying a difference between of the first security exposure and the second security exposure on the display.
Projects
Recommendations received
18 people have recommended Brian
Join now to viewMore activity by Brian
-
Yonesy Núñez is totally right. At Lab 1 we've built an AI platform that can analyse all those terabytes of unstructured exposed data at machine…
Yonesy Núñez is totally right. At Lab 1 we've built an AI platform that can analyse all those terabytes of unstructured exposed data at machine…
Liked by Brian Laing
-
We're excited to partner with Lineaje Inc to invite you to the Software Supply Chain Security Summit - April 9, 2025, in Bethesda, MD REGISTER:…
We're excited to partner with Lineaje Inc to invite you to the Software Supply Chain Security Summit - April 9, 2025, in Bethesda, MD REGISTER:…
Liked by Brian Laing
-
Cyber threats are evolving, and organizations must stay vigilant. This week’s roundup covers major incidents, from exposed government databases to…
Cyber threats are evolving, and organizations must stay vigilant. This week’s roundup covers major incidents, from exposed government databases to…
Liked by Brian Laing
-
Don’t let the closure of Skybox leave your network security in the dark. With RedSeal, you get a seamless migration, full continuity of your critical…
Don’t let the closure of Skybox leave your network security in the dark. With RedSeal, you get a seamless migration, full continuity of your critical…
Liked by Brian Laing
-
🚀 Why Going 100% Channel Drives Faster Adoption 🚀 When you’re fully committed to the channel, your partners know it. And when they know it, they…
🚀 Why Going 100% Channel Drives Faster Adoption 🚀 When you’re fully committed to the channel, your partners know it. And when they know it, they…
Liked by Brian Laing
-
What happens when you bring together 20 Cloud GTM leaders - from marketplace leaders who've driven 📈 millions in marketplace revenue to alliance…
What happens when you bring together 20 Cloud GTM leaders - from marketplace leaders who've driven 📈 millions in marketplace revenue to alliance…
Liked by Brian Laing
-
I don't often take the time to write this type of message, but I'm feeling extremely grateful today. I've been with Novacoast for almost 25 years…
I don't often take the time to write this type of message, but I'm feeling extremely grateful today. I've been with Novacoast for almost 25 years…
Liked by Brian Laing
-
🔒 CVE triage at the infrastructure level? Pretty solid. 🐛 CVE triage at the application layer? Still a mess. Traditional tools flood AppSec teams…
🔒 CVE triage at the infrastructure level? Pretty solid. 🐛 CVE triage at the application layer? Still a mess. Traditional tools flood AppSec teams…
Liked by Brian Laing
-
Without US government mandates on AI Safety and Security, should we relax or be worried? Read our latest blog on how this vacuum on AI Safety will…
Without US government mandates on AI Safety and Security, should we relax or be worried? Read our latest blog on how this vacuum on AI Safety will…
Liked by Brian Laing
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Brian Laing in United States
31 others named Brian Laing in United States are on LinkedIn
See others named Brian Laing