Menu

Patents

Attack surface identification
Sumpter; Jason Emile et al.
2022-11-29
21
Configurable system for detecting social media threats
McEachern; Kavan B. et al.
2022-11-15
24
Systems and methods for threat disruption
Small; Samuel Kevin et al.
2022-09-20
17
Malicious social media account identification
Foster; James et al.
2022-08-16
48
Troll account detection
Foster; James et al.
2022-08-02
48
Methods and systems for detecting impersonating social media profiles
McEachern; Kavan B.
2022-07-26
19
Social media rule engine
Price; Michael et al.
2022-07-19
40
Detection impersonation attempts social media messaging
Singh; Jasmeet et al.
2022-06-14
14
End user social network protection portal
Price; Michael et al.
2022-02-22
43
CONFIGURABLE SYSTEM FOR DETECTING SOCIAL MEDIA THREATS
McEachern; Kavan B. et al.
2021-11-18
23
Social threat correlation
Cullison; Christopher B. et al.
2021-11-02
43
Methods and systems for enriching data
Price; Matthew Alan
2021-10-12
17
Automated social account removal
Foster; James et al.
2021-09-28
50
METHODS AND SYSTEMS FOR DETECTING IMPERSONATING SOCIAL MEDIA PROFILES
McEachern; Kavan B.
2021-09-09
19
METHODS AND SYSTEMS FOR DETECTING DEEPFAKES
Price; Michael Morgan et al.
2021-05-13
15
SYSTEM AND METHODS FOR MANAGING HIGH VOLUMES OF ALERTS
Small; Samuel Kevin et al.
2021-05-13
22
METHODS AND SYSTEMS FOR ENRICHING DATA
Price; Matthew Alan
2021-05-06
17
Identification of vulnerability to social phishing
Foster; James et al.
2021-05-04
20
Methods and systems for detecting deepfakes
Price; Michael Morgan et al.
2021-02-23
16
METHODS AND SYSTEMS FOR DETECTING DEEPFAKES
Price; Michael Morgan et al.
2021-02-11
15
Method of Managing a Personal Payment Platform
Mcleod; Martin Thomas et al.
2020-12-17
58
Organizational social threat reporting
Cullison; Christopher B. et al.
2020-12-15
46
Identification of Vulnerability to Social Phishing
Foster; James et al.
2020-03-19
18
Identification of vulnerability to social phishing
Foster; James et al.
2019-12-24
19
Social network security monitoring
Foster; James C. et al.
2019-11-26
15
AUTOMATED SOCIAL ACCOUNT REMOVAL
Foster; James et al.
2019-04-25
49
TROLL ACCOUNT DETECTION
Foster; James et al.
2019-02-28
47
Malicious social media account identification
Foster; James et al.
2019-02-28
47
Social threat correlation
Cullison; Christopher B. et al.
2019-02-21
42
ORGANIZATIONAL SOCIAL THREAT REPORTING
Cullison; Christopher B. et al.
2019-01-31
46
SOCIAL NETWORK PAGE PROTECTION
Cullison; Christopher B. et al.
2019-01-31
46
METHODS FOR AUTOMATED SOCIAL PHISHING
Foster; James et al.
2019-01-10
40
SOCIAL MEDIA RULE ENGINE
Price; Michael et al.
2018-10-04
39
END USER SOCIAL NETWORK PROTECTION PORTAL
Price; Michael et al.
2018-08-02
42
Systems and methods for determining the risk of information leaks from cloud-based services
Roturier; Johann et al.
2018-05-15
20
Social network data removal
Foster; James et al.
2017-06-06
37
Social network profile data removal
Foster; James et al.
2017-06-06
39
Systems and methods for detecting information leakage by an organizational insider
Roundy; Kevin Alejandro et al.
2017-05-16
18
SOCIAL NETWORK SECURITY MONITORING
Foster; James et al.
2017-05-04
11
Identification of Vulnerability to Social Phishing
Foster; James et al.
2017-01-12
18
Social network security monitoring
Foster; James et al.
2017-01-10
13
SOCIAL NETWORK SECURITY MONITORING
Foster; James et al.
2016-06-16
12
Protecting against suspect social entities
Foster; James et al.
2015-11-17
19
Social Network Data Removal
Foster; James et al.
2015-08-13
36
SOCIAL NETWORK PROFILE DATA REMOVAL
Foster; James et al.
2015-08-13
37
Social network scanning
Foster; James et al.
2015-06-09
12
Social threat scoring
Foster; James et al.
2015-05-05
28
Social Threat Scoring
Foster; James et al.
2014-11-13
27
SOCIAL RISK MANAGEMENT
Foster; James et al.
2014-11-13
27
PROTECTING AGAINST SUSPECT SOCIAL ENTITIES
Foster; James et al.
2014-10-30
18