| 12301594 |
Systems and methods for intelligently generating cybersecurity contextual intelligence and generating a cybersecurity intelligence interface |
Patrick Duffy, Kelsey Mitchell |
2025-05-13 |
| 12107886 |
Systems and methods for intelligent phishing threat detection and phishing threat remediation in a cyber security threat detection and mitigation platform |
Elisabeth Weber, Shamus Field |
2024-10-01 |
| 12101348 |
Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform |
Matt Peters, Dan Whalen, Elisabeth Weber, Jon Hencinski, John Begeman |
2024-09-24 |
| 11936672 |
Systems and methods for intelligently generating cybersecurity contextual intelligence and generating a cybersecurity intelligence interface |
Patrick Duffy, Kelsey Mitchell |
2024-03-19 |
| 11809554 |
Systems and methods for intelligent cyber security threat detection and intelligent verification-informed handling of cyber security events through automated verification workflows |
Jonathan Hencinski, Dan Whalen, Roger Studner |
2023-11-07 |
| 11799887 |
Systems and methods for intelligently generating cybersecurity contextual intelligence and generating a cybersecurity intelligence interface |
Patrick Duffy, Kelsey Mitchell |
2023-10-24 |
| 11693959 |
Systems and methods for intelligent cybersecurity alert similarity detection and cybersecurity alert handling |
Dan Whalen, Matt Berninger, Paul Diebold, Ben Kawecki |
2023-07-04 |
| 11658999 |
Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform |
Matt Peters, Dan Whalen, Elisabeth Weber, Jon Hencinski, John Begeman |
2023-05-23 |
| 11556638 |
Systems and methods for intelligent cybersecurity alert similarity detection and cybersecurity alert handling |
Dan Whalen, Matt Berninger, Paul Diebold, Ben Kawecki |
2023-01-17 |
| 11550907 |
Systems and methods for intelligent cyber security threat detection and intelligent verification-informed handling of cyber security events through automated verification workflows |
Jonathan Hencinski, Dan Whalen, Roger Studner |
2023-01-10 |
| 11509689 |
Systems and methods for intelligent phishing threat detection and phishing threat remediation in a cyber security threat detection and mitigation platform |
Elisabeth Weber, Shamus Field |
2022-11-22 |
| 11310270 |
Systems and methods for intelligent phishing threat detection and phishing threat remediation in a cyber security threat detection and mitigation platform |
Elisabeth Weber, Shamus Field |
2022-04-19 |
| 11303666 |
Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform |
Matt Peters, Dan Whalen, Elisabeth Weber, Jon Hencinski, John Begeman |
2022-04-12 |
| 11176251 |
Determining malware via symbolic function hash analysis |
Todd Plantenga, Damieon Stark |
2021-11-16 |
| 10019573 |
System and method for detecting executable machine instructions in a data stream |
James R. Butler, Nick J. Harbour |
2018-07-10 |
| 8713681 |
System and method for detecting executable machine instructions in a data stream |
James R. Butler, Nick J. Harbour |
2014-04-29 |