CYBER THREAT

Brand Owner (click to sort) Address Description
CYBER THREAT NAVIGATOR Binary Guard Corp. P.O. Box 1085 Germantown MD 20875 CYBER THREAT;Computer services, namely, monitoring computers and computer networks for others for detecting of computer viruses, malware, advanced persistent threats, and other malicious software; software as a service (SaaS) services, namely, hosting software for use by others for monitoring computers and computer networks for detecting computer viruses, malware, advanced persistent threats, and other malicious software; design in the field of on-site electronic equipment for others for monitoring computers and computer networks and detecting computer viruses, malware, advanced persistent threats, and other malicious software; computer services, namely, analyzing data received from monitoring computers and computer networks in connection with computer viruses, malware, advanced persistent threats, and other malicious software;
INCYBERTHREAT TAPE 6363 Walker Lane | Suite 300 Alexandria VA 22310 IN CYBER THREAT;Computer consultation; Computer consultation in the field of computer security; Computer forensic services; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer systems integration services; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Preparation, update, installation and maintenance of computer software; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method of active detection of at least one threat to the homeland security. Each such threat is either hidden inside at least one cargo container before transit, or is placed inside at least one cargo container while in transit; each such threat while interacting with its surrounding generates a unique threat signature. The method comprises the following steps: (A) substantially continuously probing each cargo container; (B) detecting at least one threat signature; (C) processing each detected threat signature to determine a likelihood of at least one threat to become a threat to the homeland security; (D) identifying at least one container that includes such threat to the homeland security; and (E) eliminating such threat to the homeland security.