Computer software, namely, automated penetration testing tools capable of identifying vulnerabilities and weakness within a company's cyberspace/security posture; computer software for asset discovery, content analysis, and vulnerability scanning; computer software which leverages artificial intelligence to generate attack progression for a pen tester; computer software for cyber security risk assessment; and computer software for determining cyber security vulnerabilities
Electrical and Scientific Apparatus