Ciberseguridad

Tecnologías Asociadas
Subtecnologías

Ciberseguridad

Información ciberseguridad.

Generating Simulated Spear Phishing Messages and Customized Cybersecurity Training Modules Using Machine Learning
- Aspects of the disclosure relate to spear phishing simulation using machine learning. A computing platform may send, to an enterprise user device, a spear phishing message. The computing platform...
SYSTEMS AND METHODS FOR CAREER SELECTION AND ADAPTIVE LEARNING TECHNIQUES IN THE FIELD OF CYBERSECURITY
- A system for identifying a career suitable for a user in cybersecurity and providing an adaptive learning environment to the user's learning styles, has an input device and an output device....
Dynamically Providing Cybersecurity Training Based on User-Specific Threat Information
- Aspects of the disclosure relate to dynamically providing cybersecurity training based on user-specific threat information. A computing platform may receive, from a targeted attack protection...
System and method for adaptive graphical depiction and selective remediation of cybersecurity threats
- A method for performing cyber-security analysis includes generating a semantic graph in which each object is represented as a node, and each event associated with an object is represented as an...
CyberSecurity System Having Security Policy Visualization
- A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having security policy visualization. At least one embodiment is directed to a...
MEDICAL DEVICE CYBERSECURITY PLATFORM
- Systems and methods for the management of cybersecurity risks for medical devices are disclosed. A system may streamline and automate the process of generating a cybersecurity bill of materials...
Self-learning cybersecurity threat detection system, method, and computer program for multi-domain data
- The present disclosure describes a self-learning system, method, and computer program for detecting cybersecurity threats in a computer network based on anomalous user behavior and multi-domain...
5G CYBERSECURITY PROTECTION SYSTEM USING PERSONALIZED SIGNATURES
- The disclosed technology includes a method and system for preventing or reducing cyber-attacks in a 5G network. The system can register, by a computing device associated with the 5G network, a...
INTELLIGENT CYBERSECURITY PROTECTION SYSTEM, SUCH AS FOR USE IN 5G NETWORKS
- The disclosed technology includes a method and system for preventing or reducing cyber-attacks in telecommunications networks, such as 5G networks. For example, a first node in a 5G network can...
CYBERSECURITY RISK ANALYSIS AND ANOMALY DETECTION USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE
- A system and method for cybersecurity risk analysis and anomaly detection using active and passive external reconnaissance, that identifies critical network entities within a cyber-physical graph,...
CYBERSECURITY RESILIENCE BY INTEGRATING ADVERSARY AND DEFENDER ACTIONS, DEEP LEARNING, AND GRAPH THINKING
- A technique for providing cyber resilience by integrating autonomous adversary and defender agents, deep learning, and graph thinking. An automated competitive environment of autonomous adversary...
Physically Decentralized and Logically Centralized Autonomous Command & Control including Cybersecurity
- Various embodiments that pertain to network functions are described. A network can be an ad hoc network that function with peer-to-peer communications. The network can be physically decentralized,...
Visualizing Cybersecurity Incidents Using Knowledge Graph Data
- Information for a knowledge graph is accessed. The knowledge graph has nodes and edges of a network and has information about security incident(s) in the network. Related entities from the...
METHOD AND SYSTEM FOR HANDLING DYNAMIC CYBERSECURITY POSTURE OF A V2X ENTITY
- A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from...
METHOD AND SYSTEM FOR ESTABLISHING TRUST FOR A CYBERSECURITY POSTURE OF A V2X ENTITY
- A method at an Intelligent Transportation System (ITS) Transmitting Entity, the method including: generating an ITS message; augmenting the ITS message with an Integrity Report generated by an...
Cybersecurity System Having Digital Certificate Reputation System
- A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having a digital certificate reputation system. At least one embodiment is directed to a...
AI-DRIVEN DEFENSIVE CYBERSECURITY STRATEGY ANALYSIS AND RECOMMENDATION SYSTEM
- A system and method for automated cybersecurity defensive strategy analysis that predicts the evolution of new cybersecurity attack strategies and makes recommendations for cybersecurity...
METHOD AND SYSTEM FOR ASSESSING EFFECTIVENESS OF CYBERSECURITY CONTROLS IN AN OT ENVIRONMENT
- A cybersecurity solution for monitoring and assessing an overall cybersecurity posture level of an operation technology environment to increase the level when it is determined to be below a...
Context-aware cybersecurity training systems, apparatuses, and methods
- A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a...
OPTICALLY TRANSPARENT 3D PRINTED POLYSILOXANE SCINTILLATORS
- An ink for forming a scintillator product includes a phenylated siloxane polymer having at least one functional group per molecule for crosslinking, a filler having a refractive index about...
Evaluation of files for cybersecurity threats using global and local file information
- A global locality sensitive hash (LSH) database stores global locality sensitive hashes of files of different private computer networks. Each of the private computer networks has a corresponding...