2025
|
Invention
|
Interactive artificial intelligence-based response loop to a cyberattack.
An intelligent orchest... |
|
Invention
|
Intelligent adversary simulator.
An intelligent-adversary simulator can construct a graph of a v... |
|
Invention
|
Machine learning analyzing non-standard configurations for cyber security purposes. The DPD manag... |
|
Invention
|
A base machine learning model paired with multiple low ranking adaption attachments for cyber sec... |
|
Invention
|
Improved and augmented artificial intelligence-based investigations of potential cyber incidents,... |
|
Invention
|
Base machine learning model paired with multiple low ranking adaption attachments for cyber secur... |
|
Invention
|
Cyber security system for email message protection.
Implemented within a cyber security applianc... |
|
Invention
|
Pre-deployment detection and response.
A cloud security platform configured to protect a cloud e... |
|
Invention
|
Machine learning analyzing non-standard configurations for cyber security purposes.
The DPD mana... |
|
Invention
|
Artificial intelligence based analyst as an evaluator.
Methods, systems, and apparatus are discl... |
|
Invention
|
Detection and deobfuscation of barcodes such as qr codes.
A cyber security appliance for detecti... |
|
Invention
|
Incorporating software-as-a-service data into a cyber threat defense system.
A cyber threat defe... |
2024
|
Invention
|
Cyber security using models including a model trained on a normal behavior.
Disclosed herein is ... |
|
Invention
|
Ai cybersecurity system monitoring wireless data transmissions.
A coordinator module, a cyber th... |
|
Invention
|
User agent inference and active endpoint fingerprinting for encrypted connections.
A cyber secur... |
|
Invention
|
Voice cloning detection and training system for a cyber security system.
A cyber security system... |
|
Invention
|
Voice cloning detection and training system for a cyber security system. A cyber security system ... |
|
Invention
|
Cloud-based cyber security and methods of operation.
A cyber security system is adapted to conte... |
|
Invention
|
Artificial intelligence based cybersecurity system for monitoring automotive ecosystems.
A cyber... |
|
Invention
|
Cyber security to detect a malicious file.
An analyzer module determines whether a file under an... |
|
Invention
|
Clustering of high dimensional data and use thereof in cyber security.
A computer-implemented me... |
|
Invention
|
Cyber security to detect a malicious file. An analyzer module determines whether a file under ana... |
|
Invention
|
Anomaly alert system for cyber threat detection.
Disclosed herein is a method for use in detecti... |
|
Invention
|
Autonomous email report generator.
An autonomous email-report composer composes a type of report... |
|
Invention
|
Cyber security scenarios with improved playbooks.
An apparatus comprises a cyber security restor... |
|
Invention
|
Modification of connections.
An apparatus comprises a cyber threat autonomous response engine co... |
|
Invention
|
Cyber security scenarios with simulated incidents.
An apparatus comprises a cyber security resto... |
|
Invention
|
Contextualized cyber security awareness training.
A security awareness training system can inclu... |
|
Invention
|
Cyber threat defense system and method.
Cyber threat defense systems and methods are provided. T... |
|
Invention
|
Artificial intelligence adversary red team.
An AI adversary red team configured to pentest email... |
|
Invention
|
Cybersecurity components communicating and cooperating with one or more large language models.
C... |
|
Invention
|
System and method for utilizing large language models as a logical component to enhance reactive ... |
|
Invention
|
System and method for utilizing large language models for mitigation of cyber threats and remedia... |
|
Invention
|
Interactive cyber-security user-interface for cybersecurity components that cooperates with a set... |
|
Invention
|
An interactive cyber-security user-interface for cybersecurity components that cooperates with a ... |
|
Invention
|
Generation of embeddings and use thereof for detection and cyber security analysis.
In an embodi... |
|
Invention
|
System and method for utilizing large language models and natural language processing technologie... |
|
Invention
|
System and method for adjusting or creating ai models based on model breach alerts.
A cybersecur... |
|
Invention
|
Synthetic cyberattack tool that uses a generative artificial intelligence component.
A synthetic... |
|
Invention
|
Cyber security training tool that uses a large language model.
The cyber security training tool ... |
|
Invention
|
Interactive extension for a cybersecurity appliance.
In an embodiment, an apparatus is described... |
|
Invention
|
Treating data flows differently based on level of interest.
A traffic manager module of a cyber ... |
|
Invention
|
Method and system for determining and acting on a structured document cyber threat risk.
A cyber... |
|
Invention
|
Multi-stage anomaly detection for process chains in multi-host environments.
A multi-stage anoma... |
|
Invention
|
Cyber threat defense system protecting email networks with machine learning models using a range ... |
|
Invention
|
Endpoint agent extension of a machine learning cyber defense system for email.
An endpoint agent... |
|
Invention
|
Cyber security system applying network sequence prediction using transformers.
A cyber threat de... |
|
Invention
|
A secure communication platform for a cybersecurity system.
An expert interface component can au... |
2023
|
Invention
|
Cyber security system with cloud architecture formation and visualization.
A cyber security syst... |
|
Invention
|
Automated security analysis and response of container environments.
A computer security method f... |
2021
|
G/S
|
Computer hardware; downloadable computer programs for network management; data banks, namely, com... |
|
G/S
|
Computer hardware; downloadable computer software and computer hardware for monitoring computer n... |
|
G/S
|
Computer software; computer hardware; computer programs;
data banks; computer systems for monito... |
2018
|
G/S
|
Computer hardware; data banks; computer hardware and recorded software systems for monitoring com... |
|
G/S
|
Computer hardware; computer hardware and recorded software systems for monitoring computer networ... |
|
G/S
|
Computer software; computer hardware; computer programs;
data banks (terms considered too vague ... |
|
G/S
|
Computer software; computer hardware; computer programs;
data banks (term considered too vague b... |
2016
|
G/S
|
Computer software and computer systems comprised of computer hardware and computer peripherals fo... |
2015
|
G/S
|
Computer software and computer systems for monitoring, measuring, tracking and reporting computer... |
2013
|
G/S
|
Computer software and computer systems for monitoring computer network behavioural patterns to de... |