Portland, OR, United States of America

Bob Terhune


Average Co-Inventor Count = 10.0

ph-index = 1

Forward Citations = 21(Granted Patents)


Company Filing History:


Years Active: 2024

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Bob Terhune: Innovator in Vulnerability Management

Introduction

Bob Terhune is a notable inventor based in Portland, OR (US). He has made significant contributions to the field of cybersecurity, particularly in vulnerability management. His innovative approach has led to the development of a unique patent that addresses critical issues in this domain.

Latest Patents

Bob Terhune holds a patent for an "Agent-based vulnerability management" system. This patent describes an apparatus and methods for analyzing vulnerabilities with an agent executing on a computer host using a vulnerability scanner and vulnerability server. The method involves searching for data associated with a vulnerability test to determine its availability. If the data is available, prior scan results are provided to a vulnerability aggregation server. If not, the scanner performs a scan of the host to obtain the necessary results. This innovative approach enhances the efficiency and effectiveness of vulnerability management.

Career Highlights

Bob Terhune is currently employed at Tripwire, Inc., where he continues to develop solutions that improve cybersecurity measures. His work has been instrumental in advancing the capabilities of vulnerability management systems. With a focus on practical applications, he has contributed to making systems more secure and resilient against potential threats.

Collaborations

Some of Bob's coworkers include Mark Pieno and Tyler Reguly. Their collaboration fosters a creative environment that encourages innovation and the development of cutting-edge solutions in the field of cybersecurity.

Conclusion

Bob Terhune's contributions to vulnerability management through his patent and work at Tripwire, Inc. highlight his role as an important figure in the cybersecurity landscape. His innovative methods continue to shape the way vulnerabilities are analyzed and managed, ensuring a safer digital environment.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…