|
2026
|
P/S
|
Computer security consulting; consulting in the field of information technology; computer securit... |
|
|
P/S
|
Computer security consulting; consulting in the field of
information technology; computer securi... |
|
2025
|
P/S
|
Computer security consulting; consulting in the field of information technology; Computer securit... |
|
|
P/S
|
Financial services, namely, providing financing for purchasing cybersecurity software and service... |
|
|
Invention
|
Securing function as a service cloud computing environments.
A system and method of securing a F... |
|
|
Invention
|
Directory service recommender assessment & scoring.
A cybersecurity service assesses, scores, an... |
|
|
P/S
|
Downloadable computer software for computer and network
security. Computer consultation; consult... |
|
|
P/S
|
Downloadable computer software for computer and network security. Computer consultation; consulti... |
|
|
Invention
|
Cpe prediction using banner-prompted ai/ml modeling. Prediction of CPEs using banners greatly imp... |
|
|
Invention
|
Cpe prediction using banner-prompted llm. Prediction of CPEs using banners greatly improves compu... |
|
|
Invention
|
Context-sensitive token-bucket rate limiting in ebpf. The present disclosure provides techniques ... |
|
2024
|
Invention
|
Fine-grained access to system commands run via an installed agent application. The present disclo... |
|
|
Invention
|
Bounding resource consumption in signal with penalty box.
The present disclosure provides techni... |
|
|
Invention
|
Cybersecurity provenance of ml/ai models.
A cybersecurity model assessment service assesses mach... |
|
|
Invention
|
Enriching an event stream with entity state information.
Techniques for enriching events with en... |
|
|
Invention
|
Event detection model.
The present disclosure provides techniques for event detection. A process... |
|
|
Invention
|
Defining indicators of malicious activity by a machine learned model.
Techniques for determining... |
|
|
Invention
|
Cybersecurity detection grouping.
A cybersecurity service assesses cybersecurity detections repo... |
|
|
Invention
|
Machine speed attack defense.
The present disclosure provides techniques for machine speed attac... |
|
|
Invention
|
Multi-modal queries in a digital cybersecurity systems.
Multi-modal query processing greatly imp... |
|
|
Invention
|
Information classification based on detecting provisions for intrusive actions.
The present disc... |
|
|
Invention
|
Cybersecurity breach prediction.
Prediction of cybersecurity breaches greatly improves computer ... |
|
|
Invention
|
Auto-customizing configuration assessment rule values from captured state of a template machine. ... |
|
|
Invention
|
Irregular interactive command prompt activity detection.
Techniques are provided to detect irreg... |
|
|
Invention
|
Representation-agnostic file classifier.
A method of monitoring an endpoint for malicious code i... |
|
|
Invention
|
Semi-supervised malware classification using representation-agnostic transformer models.
A metho... |
|
|
Invention
|
Estimating cost of query execution on a set of data accessible to a computing system. Estimating ... |
|
|
Invention
|
Cpe prediction using banner similarity.
Prediction of matches between CPEs and banners greatly i... |
|
|
Invention
|
Prediction of false positive cybersecurity detections.
Prediction of false positive cybersecurit... |
|
|
Invention
|
Large byte model.
A cloud-based service assesses sequences of bits/bytes in natural language usi... |
|
|
Invention
|
Ai model-based data enrichment pipeline.
The present disclosure provides an approach of generati... |
|
|
Invention
|
Repository scanning coordinator.
A repository scanning coordinator is disclosed herein. The repo... |
|
|
Invention
|
Preserving decision value order while training successive artificial intelligence model releases.... |
|
|
Invention
|
Trusted identification verification system.
The present disclosure provides techniques for biome... |
|
|
P/S
|
Computer security consulting; consulting in the field of information technology; consultation in ... |
|
|
Invention
|
System and method for interpreting superclass behavior in dynamic language computer code.
A meth... |
|
|
Invention
|
Static analysis techniques for dynamic computer programming language.
A method includes accessin... |
|
|
Invention
|
Systems and methods for labeling event data obtained from a computing environment using artificia... |
|
|
Invention
|
Identifying atypical activity involving an entity in a computer system. Timestamped events involv... |
|
|
Invention
|
Image analysis using a multimodal large language model.
Techniques for automatically determining... |
|
|
Invention
|
Synchronization protocol in a cloud computing environment.
Techniques for exchanging data betwee... |
|
|
Invention
|
Determining and mitigating artificial intelligence model vulnerabilities.
The present disclosure... |
|
|
Invention
|
Protected training of private adapter models for a hosted foundation model.
Methods and systems ... |
|
|
Invention
|
Cross-cluster search optimization. A preliminary tag search improves computer functioning by redu... |
|
|
Invention
|
Patch complexity classification.
The present disclosure provides an approach of collecting vulne... |
|
|
Invention
|
Enhanced data pruning strategy for malware detection models.
Methods and systems for implementin... |
|
|
Invention
|
Cybersecurity vulnerability detection with artificial intelligence models.
The present disclosur... |
|
|
Invention
|
Computing fairness.
Estimated and actual processor runtimes improve computer functioning in fair... |
|
|
Invention
|
Cloud-based file integrity monitoring.
A cloud-based file integrity monitoring service identifie... |
|
|
Invention
|
Automated ai model-based pipeline for detection explainability.
The present disclosure provides ... |
|
|
Invention
|
Creating complex honeynet environments with generative artificial intelligence.
Systems and meth... |
|
|
Invention
|
Automatic rule generation for malicious indicators based on historical data. Malicious indicators... |
|
|
Invention
|
Internet-exposed device discovery.
A cloud-based, external attack surface management (or EASM) s... |
|
|
Invention
|
Machine learned contextual cybersecurity threat prioritization.
A cloud-based cybersecurity dete... |
|
|
Invention
|
Cybersecurity command line assessment.
A cloud-based, machine-learned cybersecurity command line... |
|
|
P/S
|
Software as a service (SaaS) services featuring software for automating customer interactions and... |
|
|
P/S
|
Software as a service (SaaS) services featuring software for
automating customer interactions an... |
|
|
P/S
|
Software as a service (SAAS) services featuring software for collecting, sorting, searching, sear... |
|
|
Invention
|
Automatically determining and modifying environments for running microservices in a performant an... |
|
2023
|
P/S
|
Software for collecting, sorting, searching, processing,
encrypting, transmitting, routing, repo... |
|
|
P/S
|
Computer security consulting; Consulting in the field of information technology relating to insta... |
|
|
P/S
|
Computer security consulting; consulting services in the field of information technology, namely... |
|
|
P/S
|
Business administration services; business services, namely, administration of a program for enab... |
|
|
P/S
|
Business analysis services, namely business profit analysis and business management analysis, bus... |
|
|
P/S
|
Business administration services; business services, namely,
administration of a program for ena... |
|
|
P/S
|
Business analysis, research and information services;
business consulting services in the field ... |
|
|
P/S
|
Business administration services; Business services, namely, administration of a program for enab... |
|
|
P/S
|
Downloadable computer software for collecting, sorting, searching, processing, encrypting, transm... |
|
|
P/S
|
Business analysis, research and information services; business consulting services in the field o... |
|
2022
|
P/S
|
Computer security consulting; consulting in the field of Internet security and information securi... |
|
|
P/S
|
Computer security consulting; consulting in the field of
information technology; consultation fo... |
|
|
P/S
|
Cyber security technology services, namely, providing
comprehensive application programming inte... |
|
|
P/S
|
Cyber security technology services, namely, providing comprehensive application programming inter... |
|
|
Invention
|
Agentless system and method for discovering and inspecting applications and services in compute e... |
|
|
P/S
|
Downloadable computer software for the protection and
security of computer networks and computin... |
|
|
P/S
|
Educational services, namely, providing online and in-person courses of instruction for detecting... |
|
|
P/S
|
Computer software for computer and network security. Computer consultation services relating to c... |
|
2021
|
P/S
|
Computer security consulting; consulting in the field of information technology; consultation for... |
|
|
P/S
|
Providing online education in the nature of online courses in the fields of cybersecurity, endpoi... |
|
|
P/S
|
Providing information in the field of monetization of cybersecurity breaches for the protection o... |
|
|
P/S
|
Downloadable computer software for secure data access,
namely, software providing a transparent ... |
|
2020
|
P/S
|
Providing a website featuring recommendations, ratings and reviews posted by consumers about loca... |
|
|
P/S
|
Software as a service (SAAS) services featuring software for computer and network security; softw... |
|
|
P/S
|
educational services, namely, providing online and onsite courses in the fields of cybersecurity,... |
|
|
P/S
|
computer security consulting; consulting in the field of information technology; consultation in ... |