CYBER PIKE

Brand Owner (click to sort) Address Description
CYBERPIKE BATTELLE MEMORIAL INSTITUTE 505 King Avenue Columbus OH 43201 CYBER PIKE;Providing information on the topic of operational critical systems, cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; research in the field of cyber intelligence technology and cyber security technology; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
CYBERPIKE BATTELLE MEMORIAL INSTITUTE 505 King Avenue Columbus OH 43201 CYBER PIKE;Monitoring of critical systems for security purposes; Monitoring of critical systems for security purposes to substantiate operational reediness and mission assurance for businesses and governmental agencies;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and system is disclosed for adding or removing functionality to a website through a proxy platform by which a user views the website. One such functionality is a checkout button by which a cyber wallet is accessed, relaying purchase information to the website where the information is used automatically fill a merchant website purchase form.