Issued Patents All Time
Showing 1–23 of 23 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12160441 | Modeling simulated cybersecurity attack difficulty | — | 2024-12-03 |
| 12081503 | Determining authenticity of reported user action in cybersecurity risk assessment | Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart +1 more | 2024-09-03 |
| 12069083 | Assessing security risks of users in a computing network | Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Andrew Miller, Jeff Losapio, Jason Brubaker +1 more | 2024-08-20 |
| 11310261 | Assessing security risks of users in a computing network | Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Andrew Miller, Jeff Losapio, Jason Brubaker +1 more | 2022-04-19 |
| 11158207 | Context-aware cybersecurity training systems, apparatuses, and methods | Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong | 2021-10-26 |
| 10778626 | Determining authenticity of reported user action in cybersecurity risk assessment | Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart +1 more | 2020-09-15 |
| 10749887 | Assessing security risks of users in a computing network | Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Andrew Miller, Jeff Losapio, Jason Brubaker +1 more | 2020-08-18 |
| 10366080 | Methods and systems for using community defined facets or facet values in computer networks | John L. Mihalik, Thomas A. Gerace, Russell G. Barbour, Richard A. Meyer, David A. Sandborg +15 more | 2019-07-30 |
| 10243904 | Determining authenticity of reported user action in cybersecurity risk assessment | Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart +1 more | 2019-03-26 |
| 10063584 | Advanced processing of electronic messages with attachments in a cybersecurity system | John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Alan Himler, Norman Sadeh-Koniecpol | 2018-08-28 |
| 10027701 | Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system | Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Norman Sadeh-Koniecpol | 2018-07-17 |
| 9912687 | Advanced processing of electronic messages with attachments in a cybersecurity system | John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Alan Himler, Norman Sadeh-Koniecpol | 2018-03-06 |
| 9870715 | Context-aware cybersecurity training systems, apparatuses, and methods | Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong | 2018-01-16 |
| 9824609 | Mock attack cybersecurity training system and methods | Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong | 2017-11-21 |
| 9813454 | Cybersecurity training system with automated application of branded content | Norman Sadeh-Koniecpol, Joseph A. Ferrara | 2017-11-07 |
| 9781149 | Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system | Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Norman Sadeh-Koniecpol | 2017-10-03 |
| 9774626 | Method and system for assessing and classifying reported potentially malicious messages in a cybersecurity system | Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Norman Sadeh-Koniecpol | 2017-09-26 |
| 9558677 | Mock attack cybersecurity training system and methods | Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong | 2017-01-31 |
| 9547998 | Context-aware training systems, apparatuses, and methods | Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong | 2017-01-17 |
| 9398029 | Cybersecurity training system with automated application of branded content | Norman Sadeh-Koniecpol, Joseph A. Ferrara | 2016-07-19 |
| 9373267 | Method and system for controlling context-aware cybersecurity training | Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong | 2016-06-21 |
| 9280911 | Context-aware training systems, apparatuses, and methods | Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong | 2016-03-08 |
| 9251279 | Methods and systems for using community defined facets or facet values in computer networks | John L. Mihalik, Thomas A. Gerace, Russell G. Barbour, Richard A. Meyer, David A. Sandborg +4 more | 2016-02-02 |