Patent attributes
A method may include obtaining first cybersecurity data using a hardware probe disposed within a network. The first cybersecurity data may correspond to an analysis of the hardware probe regarding network data that is transmitted through the network. The method may further include obtaining second cybersecurity data using a software probe operating on a network element within the network. The second cybersecurity data may correspond to an analysis of the software probe regarding one or more configuration settings of the network element. The method may further include determining a cybersecurity maturity score using the first cybersecurity data and the second cybersecurity data. The cybersecurity maturity score may be based on a maturity model. The method may further include transmitting, based on the cybersecurity maturity score, a remediation command that adjusts a configuration setting of the network.