2024
|
Invention
|
Anomaly alert system for cyber threat detection.
Disclosed herein is a method for use in detecti... |
|
Invention
|
Autonomous email report generator.
An autonomous email-report composer composes a type of report... |
|
Invention
|
Modification of connections.
An apparatus comprises a cyber threat autonomous response engine co... |
|
Invention
|
Cyber security scenarios with improved playbooks.
An apparatus comprises a cyber security restor... |
|
Invention
|
Contextualized cyber security awareness training.
A security awareness training system can inclu... |
|
Invention
|
Cyber security scenarios with simulated incidents.
An apparatus comprises a cyber security resto... |
|
Invention
|
Cyber threat defense system and method.
Cyber threat defense systems and methods are provided. T... |
|
Invention
|
Artificial intelligence adversary red team.
An AI adversary red team configured to pentest email... |
|
Invention
|
Cybersecurity components communicating and cooperating with one or more large language models.
C... |
|
Invention
|
System and method for utilizing large language models as a logical component to enhance reactive ... |
|
Invention
|
System and method for utilizing large language models for mitigation of cyber threats and remedia... |
|
Invention
|
Interactive cyber-security user-interface for cybersecurity components that cooperates with a set... |
|
Invention
|
Generation of embeddings and use thereof for detection and cyber security analysis.
In an embodi... |
|
Invention
|
System and method for utilizing large language models and natural language processing technologie... |
|
Invention
|
System and method for adjusting or creating ai models based on model breach alerts.
A cybersecur... |
|
Invention
|
Synthetic cyberattack tool that uses a generative artificial intelligence component.
A synthetic... |
|
Invention
|
Cyber security training tool that uses a large language model.
The cyber security training tool ... |
|
Invention
|
Interactive extension for a cybersecurity appliance.
In an embodiment, an apparatus is described... |
|
Invention
|
Treating data flows differently based on level of interest.
A traffic manager module of a cyber ... |
|
Invention
|
Method and system for determining and acting on a structured document cyber threat risk.
A cyber... |
|
Invention
|
Multi-stage anomaly detection for process chains in multi-host environments.
A multi-stage anoma... |
|
Invention
|
Cyber threat defense system protecting email networks with machine learning models using a range ... |
|
Invention
|
Endpoint agent extension of a machine learning cyber defense system for email.
An endpoint agent... |
|
Invention
|
Cyber security system applying network sequence prediction using transformers.
A cyber threat de... |
|
Invention
|
A secure communication platform for a cybersecurity system.
An expert interface component can au... |
|
Invention
|
Method, apparatus, and system to map network reachability.
The network reachability module maps ... |
2023
|
Invention
|
Cyber security system with cloud architecture formation and visualization.
A cyber security syst... |
|
Invention
|
Cyber security system for cloud environment analytics.
A non-transitory computer readable medium... |
|
Invention
|
Cyber security system with enhanced cloud-based metrics.
A cyber security system is adapted to c... |
|
Invention
|
Use of graph neural networks to classify, generate, and analyze synthetic cyber security incident... |
|
Invention
|
Large scale security data aggregation, with machine learning analysis and use of that security da... |
|
Invention
|
User importance metric for email.
The email system utilizes statistical analysis to assign an im... |
|
Invention
|
Cyber security appliance for an operational technology network.
A cyber security appliance has o... |
|
Invention
|
Method for sharing cybersecurity threat analysis and defensive measures amongst a community.
A c... |
|
Invention
|
Automated sandbox generator for a cyber-attack exercise on a mimic network in a cloud environment... |
|
Invention
|
An interactive cyber security user interface. An interactive cyber security user interface is pro... |
|
Invention
|
A cyber security restoration engine. A cyber security restoration engine prioritizes nodes in a g... |
|
Invention
|
Interactive cyber security user interface.
An interactive cyber security user interface is provi... |
|
Invention
|
Cyber security restoration engine.
A cyber security restoration engine prioritizes nodes in a gr... |
|
Invention
|
Malicious site detection for a cyber threat response system.
The cyber security appliance can ha... |
|
Invention
|
Intelligent adversary simulator.
An intelligent-adversary simulator can construct a graph of a v... |
|
Invention
|
Autonomous report composer.
An autonomous report composer composes a type of report on cyber thr... |
|
Invention
|
Incorporating software-as-a-service data into a cyber threat defense system.
A cyber threat defe... |
|
Invention
|
Endpoint agents and scalable cloud architecture for low latency classification.
A classifier det... |
|
Invention
|
Unifying of the network device entity and the user entity for better cyber security modeling alon... |
|
Invention
|
Analyses and aggregation of domain behavior for email threat detection by a cyber security system... |
|
Invention
|
Endpoint agents and scalable cloud architecture for low latency classification. A classifier dete... |
|
Invention
|
A unifying of the network device entity and the user entity for better cyber security modeling al... |
2022
|
Invention
|
Intelligent prioritization of assessment and remediation of common vulnerabilities and exposures ... |
2021
|
G/S
|
Computer hardware; downloadable computer programs for network management; data banks, namely, com... |
|
G/S
|
Computer hardware; downloadable computer software and computer hardware for monitoring computer n... |
|
G/S
|
Computer software; computer hardware; computer programs;
data banks; computer systems for monito... |
2020
|
Invention
|
Autonomous email report generator. An autonomous email-report composer composes a type of report ... |
2018
|
G/S
|
Computer hardware; data banks; computer hardware and recorded software systems for monitoring com... |
|
G/S
|
Computer hardware; computer hardware and recorded software systems for monitoring computer networ... |
|
G/S
|
Computer software; computer hardware; computer programs;
data banks (terms considered too vague ... |
|
G/S
|
Computer software; computer hardware; computer programs;
data banks (term considered too vague b... |
2016
|
G/S
|
Computer software and computer systems comprised of computer hardware and computer peripherals fo... |
2015
|
G/S
|
Computer software and computer systems for monitoring, measuring, tracking and reporting computer... |
2013
|
G/S
|
Computer software and computer systems for monitoring computer network behavioural patterns to de... |