| 12388841 |
System and method for threat detection across multiple cloud environments utilizing normalized event logs |
George PISHA, Liran Moysi, Itay Vanzetti |
2025-08-12 |
| 12388854 |
System and method for generating normalized event logs for cloud detection and response in a multi-layered cloud environment |
George PISHA, Liran Moysi, Itay Vanzetti |
2025-08-12 |
| 12284195 |
Techniques for detecting cloud identity misuse leveraging runtime context |
Ami Luttwak, Shir Tamari, Ron Cohen |
2025-04-22 |
| 12278825 |
System and method for cybersecurity threat detection utilizing static and runtime data |
Aviel FOGEL, Udi REITBLAT, Ami Luttwak, Roy REZNIK, Yinon COSTICA |
2025-04-15 |
| 12273370 |
System and method for detecting cybersecurity risks in managed artificial intelligence models |
Amitai Cohen, Barak SHARONI, Alon Weiss, Itay Arbel, George PISHA +2 more |
2025-04-08 |
| 12261877 |
Detecting malware infection path in a cloud computing environment utilizing a security graph |
Elad Gabay, Yaniv Shaked, Roy REZNIK, Ami Luttwak |
2025-03-25 |
| 12229257 |
Techniques for preventing cloud identity misuse leveraging runtime context |
Ami Luttwak, Shir Tamari, Ron Cohen |
2025-02-18 |
| 12225037 |
Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context |
Ami Luttwak, Shir Tamari, Ron Cohen |
2025-02-11 |
| 12212586 |
Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources |
Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +2 more |
2025-01-28 |
| 12189774 |
Techniques for detecting cloud identity misuse based on runtime context and static analysis |
Ami Luttwak, Shir Tamari, Ron Cohen |
2025-01-07 |
| 12164963 |
Techniques for detecting AI pipelines in cloud computing environments |
Ami Luttwak, Amitai Cohen, Yinon COSTICA, Roy REZNIK, Mattan SHALEV |
2024-12-10 |
| 12093374 |
Cybersecurity incident response techniques utilizing artificial intelligence |
Barak SHARONI, Amitai Cohen, Ami Luttwak, Roy REZNIK, Yinon COSTICA |
2024-09-17 |
| 12028368 |
System and method for detecting cybersecurity risks in managed artificial intelligence models |
Amitai Cohen, Barak SHARONI, Alon Weiss, Itay Arbel, George PISHA +2 more |
2024-07-02 |
| 12010139 |
Detecting malware infection path in a cloud computing environment utilizing a security graph |
Elad Gabay, Yaniv Shaked, Roy REZNIK, Ami Luttwak |
2024-06-11 |
| 12001549 |
Cybersecurity incident response techniques utilizing artificial intelligence |
Barak SHARONI, Amitai Cohen, Ami Luttwak, Roy REZNIK, Yinon COSTICA |
2024-06-04 |
| 12001550 |
Cybersecurity incident response techniques utilizing artificial intelligence |
Barak SHARONI, Amitai Cohen, Ami Luttwak, Roy REZNIK, Yinon COSTICA |
2024-06-04 |
| 11841945 |
System and method for cybersecurity threat detection utilizing static and runtime data |
Aviel FOGEL, Udi REITBLAT, Ami Luttwak, Roy REZNIK, Yinon COSTICA |
2023-12-12 |
| 11706252 |
Detecting malware infection path in a cloud computing environment utilizing a security graph |
Elad Gabay, Yaniv Shaked, Roy REZNIK, Ami Luttwak |
2023-07-18 |