20 patents
Utility
Systems and techniques for guiding a response to a cybersecurity incident
5 Sep 23
A cybersecurity engine can guide a forensic investigation of a security incident by estimating the utility of investigating events associated with the security incident, selecting a subset of such events based on the estimated utilities, and presenting data associated with the selected events to the investigator.
Christopher Lord, Benjamin Johnson, Doran Smestad, Joshua Hartley
Filed: 1 Mar 21
Utility
Methods for behavioral detection and prevention of cyberattacks, and related apparatus and techniques
23 May 23
A security engine may use event-stream processing and behavioral techniques to detect ransomware.
Jeffrey Albin Kraemer, Adam Karol Malinowski
Filed: 16 Apr 21
Utility
System and method for identifying and controlling polymorphic malware
24 May 22
The present system and method pertain to the detection of malicious software and processes such as malware.
Jeffrey Albin Kraemer
Filed: 31 May 19
Utility
Systems and methods for tracking and recording events in a network of computing systems
23 Nov 21
A security client can be configured to operate on the one or more computing systems and record all events occurring on the one or more computing systems.
Michael Viscuso, Benjamin Johnson, Allen Saunders, Andrew Ruef, Jason James McFarland
Filed: 19 Oct 18
Utility
Cybersecurity Incident Detection Systems and Techniques
30 Sep 21
Behavioral baselines for a computer system may be accurately and efficiently established by (1) monitoring occurrences on the computer system, (2) determining, based on security rules or heuristics, which of the observed occurrences are associated with potential security risks, (3) identifying patterns of activity based on the suspicious occurrences, and (4) prompting a user to indicate whether the observed patterns of suspicious activity are expected or unexpected.
Jason A. GARMAN, Benjamin JOHNSON, Jason J. McFARLAND
Filed: 25 Mar 21
Utility
Multi-host threat tracking
24 Aug 21
A system and method for tracking data security threats within an organization is proposed.
Jeffrey Albin Kraemer, Ranganathan Gopalan
Filed: 27 Jun 19
Utility
Methods for Behavioral Detection and Prevention of Cyberattacks, and Related Apparatus and Techniques
29 Jul 21
A security engine may use event-stream processing and behavioral techniques to detect ransom ware.
Jeffrey Albin KRAEMER, Adam Karol MALINOWSKI
Filed: 16 Apr 21
Utility
Cybersecurity systems and techniques
20 Jul 21
Cybersecurity systems and techniques are described.
Scott Lundgren, Daniel Wachdorf
Filed: 14 Aug 19
Utility
Methods for protecting software hooks, and related computer security systems and apparatus
22 Jun 21
A computing apparatus for protecting software hooks from interference may include a processing device and a memory access monitoring device configured to monitor access to the memory addresses of one or more hooks.
Paul M. Drapeau, Brian M. Sturk
Filed: 27 Sep 18
Utility
Using private threat intelligence in public cloud
22 Jun 21
A distributed security system and method are disclosed that enable access to known threat events from threat intelligence feeds when the system includes public cloud components.
Jeffrey Albin Kraemer, Sanket Choksey, Ranganathan Gopalan
Filed: 13 Mar 17
Utility
Systems and Techniques for Guiding a Response to a Cybersecurity Incident
17 Jun 21
A cybersecurity engine can guide a forensic investigation of a security incident by estimating the utility of investigating events associated with the security incident, selecting a subset of such events based on the estimated utilities, and presenting data associated with the selected events to the investigator.
Christopher LORD, Benjamin JOHNSON, Doran SMESTAD, Joshua HARTLEY
Filed: 1 Mar 21
Utility
Methods for behavioral detection and prevention of cyberattacks, and related apparatus and techniques
11 May 21
A security engine may use event-stream processing and behavioral techniques to detect ransomware.
Jeffrey Albin Kraemer, Adam Karol Malinowski
Filed: 11 Sep 18
Utility
Cybersecurity incident detection systems and techniques
6 Apr 21
Behavioral baselines for a computer system may be accurately and efficiently established by (1) monitoring occurrences on the computer system, (2) determining, based on security rules or heuristics, which of the observed occurrences are associated with potential security risks, (3) identifying patterns of activity based on the suspicious occurrences, and (4) prompting a user to indicate whether the observed patterns of suspicious activity are expected or unexpected.
Jason A. Garman, Benjamin Johnson, Jason J. McFarland
Filed: 14 Sep 17
Utility
Systems and techniques for guiding a response to a cybersecurity incident
2 Mar 21
A cybersecurity engine can guide a forensic investigation of a security incident by estimating the utility of investigating events associated with the security incident, selecting a subset of such events based on the estimated utilities, and presenting data associated with the selected events to the investigator.
Christopher Lord, Benjamin Johnson, Doran Smestad, Joshua Hartley
Filed: 7 Jun 19
Utility
Cybersecurity Systems and Techniques
7 Oct 20
Cybersecurity systems and techniques are described.
Scott Lundgren, Daniel Wachdorf
Filed: 13 Aug 19
Utility
System and method for process hollowing detection
22 Jun 20
A method and system for remediating a process hollowing intrusion on a user device comprising detecting a process starting on the user device, preparing the process to monitor Application Programming Interface (API) calls between the process and an operating system of the user device, determining whether the process is associated with a process hollowing intrusion based on information associated with the process and/or the API calls, and executing security policies against the process associated with the process hollowing intrusion.
Jeffrey Albin Kraemer, Paul Matthew Drapeau
Filed: 2 Jul 18
Utility
System and method for reverse command shell detection
23 Mar 20
A system and method for detecting reverse command shell intrusions at a process-level on a user device is disclosed.
Jeffrey Albin Kraemer
Filed: 8 Aug 18
Utility
Systems and Techniques for Guiding a Response to a Cybersecurity Incident
23 Oct 19
A cybersecurity engine can guide a forensic investigation of a security incident by estimating the utility of investigating events associated with the security incident, selecting a subset of such events based on the estimated utilities, and presenting data associated with the selected events to the investigator.
Christopher Lord, Benjamin Johnson, Doran Smestad, Joshua Hartley
Filed: 6 Jun 19
Utility
Multi-host Threat Tracking
16 Oct 19
A system and method for tracking data security threats within an organization is proposed.
Jeffrey Albin Kraemer, Ranganathan Gopalan
Filed: 26 Jun 19
Utility
System and Method for Identifying and Controlling Polymorphic Malware
2 Oct 19
The present system and method pertain to the detection of malicious software and processes such as malware.
Jeffrey Albin Kraemer
Filed: 30 May 19
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first