Search results
Appearance
Page title matches
- =REDUCING CYBERSECURITY RISK LEVEL OF A PORTFOLIO OF COMPANIES USING A CYBERSECURITY RISK MULTIPLIER= ==REDUCING CYBERSECURITY RISK LEVEL OF A PORTFOLIO OF COMPANIES USING A CYBERSECURITY RISK MULTIPLIER - A simplified explanation of the abstract== ...5 KB (673 words) - 06:40, 21 November 2024
Page text matches
- =REDUCING CYBERSECURITY RISK LEVEL OF A PORTFOLIO OF COMPANIES USING A CYBERSECURITY RISK MULTIPLIER= ==REDUCING CYBERSECURITY RISK LEVEL OF A PORTFOLIO OF COMPANIES USING A CYBERSECURITY RISK MULTIPLIER - A simplified explanation of the abstract== ...5 KB (673 words) - 06:40, 21 November 2024
- ...nes a cybersecurity posture based on the entity data. It then identifies a cybersecurity insurance plan to protect the entity and provides this plan to the entity u * Data protection system for cybersecurity insurance requests ...4 KB (498 words) - 15:43, 18 August 2024
- =DETERMINING ADDITIONAL SIGNALS FOR DETERMINING CYBERSECURITY RISK= ==DETERMINING ADDITIONAL SIGNALS FOR DETERMINING CYBERSECURITY RISK - A simplified explanation of the abstract== ...4 KB (492 words) - 06:40, 21 November 2024
- The patent application describes a system and method for consolidating cybersecurity data from multiple monitoring systems to manage threats effectively. * These signals are used to generate a unified cybersecurity object. ...4 KB (491 words) - 00:09, 2 September 2024
- =SELF-ADJUSTING CYBERSECURITY ANALYSIS WITH NETWORK MAPPING= ==SELF-ADJUSTING CYBERSECURITY ANALYSIS WITH NETWORK MAPPING - A simplified explanation of the abstract== ...5 KB (672 words) - 00:09, 2 September 2024
- =METHODS AND SYSTEMS FOR ASSESSING AND ENHANCING CYBERSECURITY OF A NETWORK= ==METHODS AND SYSTEMS FOR ASSESSING AND ENHANCING CYBERSECURITY OF A NETWORK - A simplified explanation of the abstract== ...4 KB (539 words) - 06:40, 21 November 2024
- =CYBERSECURITY INVESTIGATION TOOLS UTILIZING INFORMATION GRAPHS= ==CYBERSECURITY INVESTIGATION TOOLS UTILIZING INFORMATION GRAPHS - A simplified explanation ...4 KB (487 words) - 01:17, 18 October 2024
- =Method and System for Efficient Cybersecurity Analysis of Endpoint Events= ==Method and System for Efficient Cybersecurity Analysis of Endpoint Events - A simplified explanation of the abstract== ...4 KB (569 words) - 02:43, 26 July 2024
- =METHOD AND SYSTEM FOR HANDLING DYNAMIC CYBERSECURITY POSTURE OF A V2X ENTITY= ==METHOD AND SYSTEM FOR HANDLING DYNAMIC CYBERSECURITY POSTURE OF A V2X ENTITY - A simplified explanation of the abstract== ...4 KB (481 words) - 15:43, 18 August 2024
- =Detecting and Protecting Against Cybersecurity Attacks Using Unprintable Tracking Characters= ==Detecting and Protecting Against Cybersecurity Attacks Using Unprintable Tracking Characters - A simplified explanation of ...4 KB (507 words) - 05:46, 11 July 2024
- =Method and System for Efficient Cybersecurity Analysis of Endpoint Events= ==Method and System for Efficient Cybersecurity Analysis of Endpoint Events - A simplified explanation of the abstract== ...4 KB (609 words) - 06:24, 25 July 2024
- =INLINE INSPECTION CYBERSECURITY ENFORCEMENT OF MULTIPART FILE TRANSMISSIONS= ==INLINE INSPECTION CYBERSECURITY ENFORCEMENT OF MULTIPART FILE TRANSMISSIONS - A simplified explanation of t ...4 KB (540 words) - 06:30, 22 August 2024
- ...LEMENTED METHODS, AND COMPUTER PROGRAM PRODUCTS FOR IMPROVED REMOTE ACCESS CYBERSECURITY= ...LEMENTED METHODS, AND COMPUTER PROGRAM PRODUCTS FOR IMPROVED REMOTE ACCESS CYBERSECURITY - A simplified explanation of the abstract== ...4 KB (528 words) - 04:38, 1 October 2024
- ...etermined organization regarding an indicator of compromise (IoC) found in cybersecurity information. The method further includes generating feature information of * The observation result pertains to an indicator of compromise (IoC) in cybersecurity information. ...3 KB (440 words) - 00:09, 2 September 2024
- =CYBERSECURITY EVENT DETECTION SYSTEM AND METHOD= ==CYBERSECURITY EVENT DETECTION SYSTEM AND METHOD - A simplified explanation of the abstrac ...5 KB (651 words) - 06:15, 19 September 2024
- =SYSTEM AND METHOD FOR DETERMINING CYBERSECURITY RISK LEVEL OF ELECTRONIC MESSAGES= ==SYSTEM AND METHOD FOR DETERMINING CYBERSECURITY RISK LEVEL OF ELECTRONIC MESSAGES - A simplified explanation of the abstrac ...4 KB (550 words) - 11:51, 8 October 2024
- =TECHNIQUES FOR INSPECTING RUNNING VIRTUALIZATIONS FOR CYBERSECURITY RISKS= ==TECHNIQUES FOR INSPECTING RUNNING VIRTUALIZATIONS FOR CYBERSECURITY RISKS - A simplified explanation of the abstract== ...4 KB (571 words) - 00:08, 2 September 2024
- =AUTONOMOUS DISTRIBUTED CYBERSECURITY TESTING= ==AUTONOMOUS DISTRIBUTED CYBERSECURITY TESTING - A simplified explanation of the abstract== ...4 KB (560 words) - 00:09, 2 September 2024
- ...berthreats by generating a similarity matrix based on received clusters of cybersecurity information. ...reate the similarity matrix, representing correlations between clusters of cybersecurity information. ...4 KB (528 words) - 02:30, 18 October 2024
- ...LEMENTED METHODS, AND COMPUTER PROGRAM PRODUCTS FOR IMPROVED REMOTE ACCESS CYBERSECURITY= ...LEMENTED METHODS, AND COMPUTER PROGRAM PRODUCTS FOR IMPROVED REMOTE ACCESS CYBERSECURITY - A simplified explanation of the abstract== ...4 KB (507 words) - 06:01, 27 September 2024