7 patents
Utility
Cybersecurity Incident Detection Systems and Techniques
30 Sep 21
Behavioral baselines for a computer system may be accurately and efficiently established by (1) monitoring occurrences on the computer system, (2) determining, based on security rules or heuristics, which of the observed occurrences are associated with potential security risks, (3) identifying patterns of activity based on the suspicious occurrences, and (4) prompting a user to indicate whether the observed patterns of suspicious activity are expected or unexpected.
Jason A. GARMAN, Benjamin JOHNSON, Jason J. McFARLAND
Filed: 25 Mar 21
Utility
Methods for Behavioral Detection and Prevention of Cyberattacks, and Related Apparatus and Techniques
29 Jul 21
A security engine may use event-stream processing and behavioral techniques to detect ransom ware.
Jeffrey Albin KRAEMER, Adam Karol MALINOWSKI
Filed: 16 Apr 21
Utility
Systems and Techniques for Guiding a Response to a Cybersecurity Incident
17 Jun 21
A cybersecurity engine can guide a forensic investigation of a security incident by estimating the utility of investigating events associated with the security incident, selecting a subset of such events based on the estimated utilities, and presenting data associated with the selected events to the investigator.
Christopher LORD, Benjamin JOHNSON, Doran SMESTAD, Joshua HARTLEY
Filed: 1 Mar 21
Utility
Cybersecurity Systems and Techniques
7 Oct 20
Cybersecurity systems and techniques are described.
Scott Lundgren, Daniel Wachdorf
Filed: 13 Aug 19
Utility
Systems and Techniques for Guiding a Response to a Cybersecurity Incident
23 Oct 19
A cybersecurity engine can guide a forensic investigation of a security incident by estimating the utility of investigating events associated with the security incident, selecting a subset of such events based on the estimated utilities, and presenting data associated with the selected events to the investigator.
Christopher Lord, Benjamin Johnson, Doran Smestad, Joshua Hartley
Filed: 6 Jun 19
Utility
Multi-host Threat Tracking
16 Oct 19
A system and method for tracking data security threats within an organization is proposed.
Jeffrey Albin Kraemer, Ranganathan Gopalan
Filed: 26 Jun 19
Utility
System and Method for Identifying and Controlling Polymorphic Malware
2 Oct 19
The present system and method pertain to the detection of malicious software and processes such as malware.
Jeffrey Albin Kraemer
Filed: 30 May 19
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first