NS

Norman Sadeh-Koniecpol

WT Wombat Security Technologies: 14 patents #1 of 10Top 10%
PR Proofpoint: 6 patents #22 of 163Top 15%
CU Carnegie Mellon University: 5 patents #110 of 1,507Top 8%
📍 Pittsburgh, PA: #216 of 7,570 inventorsTop 3%
🗺 Pennsylvania: #2,452 of 74,527 inventorsTop 4%
Overall (All Time): #160,490 of 4,157,543Top 4%
25
Patents All Time

Issued Patents All Time

Showing 1–25 of 25 patents

Patent #TitleCo-InventorsDate
12081503 Determining authenticity of reported user action in cybersecurity risk assessment Kurt Wescoe, Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell +1 more 2024-09-03
12069083 Assessing security risks of users in a computing network Trevor T. Hawthorn, Nathan Andrew Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker +1 more 2024-08-20
11935082 Discovering neighborhood clusters and uses therefor Justin Brooks Cranshaw, Raz Schwartz, Jason Hong 2024-03-19
11310261 Assessing security risks of users in a computing network Trevor T. Hawthorn, Nathan Andrew Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker +1 more 2022-04-19
11222349 Discovering neighborhood clusters and uses therefor Justin Brooks Cranshaw, Raz Schwartz, Jason Hong 2022-01-11
11158207 Context-aware cybersecurity training systems, apparatuses, and methods Kurt Wescoe, Jason Brubaker, Jason Hong 2021-10-26
10778626 Determining authenticity of reported user action in cybersecurity risk assessment Kurt Wescoe, Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell +1 more 2020-09-15
10749887 Assessing security risks of users in a computing network Trevor T. Hawthorn, Nathan Andrew Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker +1 more 2020-08-18
10713672 Discovering neighborhood clusters and uses therefor Justin Brooks Cranshaw, Raz Schwartz, Jason Hong 2020-07-14
10243904 Determining authenticity of reported user action in cybersecurity risk assessment Kurt Wescoe, Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell +1 more 2019-03-26
10063584 Advanced processing of electronic messages with attachments in a cybersecurity system Kurt Wescoe, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Alan Himler 2018-08-28
10027701 Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Kurt Wescoe 2018-07-17
9912687 Advanced processing of electronic messages with attachments in a cybersecurity system Kurt Wescoe, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Alan Himler 2018-03-06
9870715 Context-aware cybersecurity training systems, apparatuses, and methods Kurt Wescoe, Jason Brubaker, Jason Hong 2018-01-16
9846887 Discovering neighborhood clusters and uses therefor Justin Brooks Cranshaw, Raz Schwartz, Jason Hong 2017-12-19
9824609 Mock attack cybersecurity training system and methods Kurt Wescoe, Jason Brubaker, Jason Hong 2017-11-21
9813454 Cybersecurity training system with automated application of branded content Kurt Wescoe, Joseph A. Ferrara 2017-11-07
9781149 Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Kurt Wescoe 2017-10-03
9774626 Method and system for assessing and classifying reported potentially malicious messages in a cybersecurity system Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Kurt Wescoe 2017-09-26
9558677 Mock attack cybersecurity training system and methods Kurt Wescoe, Jason Brubaker, Jason Hong 2017-01-31
9547998 Context-aware training systems, apparatuses, and methods Kurt Wescoe, Jason Brubaker, Jason Hong 2017-01-17
9398029 Cybersecurity training system with automated application of branded content Kurt Wescoe, Joseph A. Ferrara 2016-07-19
9373267 Method and system for controlling context-aware cybersecurity training Kurt Wescoe, Jason Brubaker, Jason Hong 2016-06-21
9280911 Context-aware training systems, apparatuses, and methods Kurt Wescoe, Jason Brubaker, Jason Hong 2016-03-08
8423483 User-controllable learning of policies Paul Hankes Drielsma, Lorrie Faith Candor, Patrick Kelley 2013-04-16