112 patents
Page 6 of 6
Utility
Systems and Methods for Aida Based A/b Testing
24 Jun 20
Systems and methods are described by which a serving module of a campaign controller identifies a first version of a model which the campaign controller uses to communicate a first simulated phishing communication to a plurality of users.
Eric SITES
Filed: 27 Feb 20
Utility
System and Methods for Efficient Combining of Malware Detection Rules
17 Jun 20
System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
Filed: 18 Apr 19
Utility
Systems and Methods of Cybersecurity Attack Simulation for Incident Response Training and Awareness
3 Jun 20
Systems and methods are disclosed that are useful for minimizing organization risk in the case of a cybersecurity attack, through computer-based simulation of cybersecurity attacks, incident response tracking and incident response training provided responsive to the simulation outcome.
Greg Kras, Alin Irimie
Filed: 1 Nov 18
Utility
Systems and Methods for Performing Simulated Phishing Attacks Using Social Engineering Indicators
20 May 20
Systems and methods are provided for performing simulated phishing attacks using social engineering indicators.
Alin Irimie, Greg Kras, David Austin, Benjamin Dalton
Filed: 22 Jan 20
Utility
Using Smart Groups for Computer-based Security Awareness Training Systems
20 May 20
This disclosure describes embodiments of an improvement to the static group solution because all the administrator needs to do is specify the criteria they care about.
Greg Kras, Alin Irimie
Filed: 22 Jan 20
Utility
System and Methods for Minimizing Organization Risk from Users Associated with a Password Breach
13 May 20
System and methods are disclosed for organizations to run a test against an active directory list to see if any user-provided passwords have been part of an existing data breach.
Greg Kras
Filed: 16 Jan 20
Utility
System and Methods for Spoofed Domain Identification and User Training
25 Mar 20
Systems and methods are disclosed that minimize ongoing risk to an organization from user behaviors which magnify the severity of a spoofed domain.
Stu Sjouwerman, Alin Irimie, Greg Kras
Filed: 25 Sep 18
Utility
Systems and Methods for Performing or Creating Simulated Phishing Attacks and Phishing Attack Campaigns
26 Feb 20
A method for establishing a campaign for a simulated phishing attack includes receiving, via a campaign manager, specification of a plurality of parameters for a campaign including at least an identifier of a campaign and identification of users to which to send the campaign, establishing, via the campaign manager, a type of exploit for the campaign and one or more types of data to collect via the type of exploit, storing, by the campaign manager, the campaign comprising the plurality of parameters, and identifying, by a simulation server, the campaign stored in the database to create a simulated phishing email, to be sent to email accounts of the users, using the plurality of parameters of the campaign, wherein the simulated phishing email is to be created to have a link to a landing page comprising the type of exploit and configured to collect the one or more types of data.
Alin Irimie, Wendy Bartlett, David Austin
Filed: 3 Nov 19
Utility
Systems and Methods for Determining Individual and Group Risk Scores
20 Nov 19
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a risk score or vulnerable for a user of a security awareness system, or for a group of users of a security awareness system.
Eric Sites, Greg Kras, Alin Irimie, Stu Sjouwerman, Marcio Castilho, Siegfried Martens, Eric Bonabeau, Kristian Kime
Filed: 14 May 19
Utility
Systems and Methods for Performing Simulated Phishing Attacks Using Social Engineering Indicators
13 Nov 19
Systems and methods are provided for performing simulated phishing attacks using social engineering indicators.
Alin Irimie, Greg Kras, David Austin, Benjamin Dalton
Filed: 20 Dec 18
Utility
Systems and Methods for Providing User Interfaces Based on Actions Associated with Untrusted Emails
6 Nov 19
The present disclosure describes a system that notifies users regarding specific user decisions with respect to solution phishing emails.
Bret Lowry, Gauvin Repuspolo, Greg Kras
Filed: 18 Jul 19
Utility
Systems and Methods for Situational Localization of Aida
6 Nov 19
The present disclosure describes systems and methods for using for a simulated phishing campaign, information about one or more situations of a user determined from an electronic calendar of the user, A campaign controller may identify an electronic calendar of a user for which to direct a simulated phishing campaign, determine one or more situations of the user from information stored in the electronic calendar and select either a template from a plurality of templates or a starting action from a plurality of starting actions for the simulated phishing campaign based at least on the one or more situations of the user.
Greg Kras
Filed: 2 Jul 19