Tel Aviv, Israel

Cobby Cohen


Average Co-Inventor Count = 15.0

ph-index = 4

Forward Citations = 70(Granted Patents)


Company Filing History:


Years Active: 2017-2020

Loading Chart...
13 patents (USPTO):Explore Patents

Title: Cobby Cohen: Innovator in Cybersecurity

Introduction

Cobby Cohen is a prominent inventor based in Tel Aviv, Israel, known for his significant contributions to the field of cybersecurity. With a total of 13 patents to his name, Cohen has developed innovative solutions aimed at enhancing network security and protecting against malicious actions.

Latest Patents

Cohen's latest patents include groundbreaking technologies such as "Multi-factor deception management and detection for malicious actions in a computer network." This patent describes a network surveillance method designed to detect attackers by planting honeytokens in various resources within a network. These honeytokens serve as decoys, alerting administrators to potential intrusions when accessed with decoy credentials. Another notable patent is "Automatically generating network resource groups and assigning customized decoy policies thereto." This invention involves a cyber security system that deploys decoy lateral attack vectors across different resource groups within an enterprise network, enhancing the overall security posture.

Career Highlights

Throughout his career, Cobby Cohen has worked with notable companies, including Illusive Networks Ltd. His experience in these organizations has allowed him to refine his expertise in cybersecurity and contribute to the development of advanced protective measures against cyber threats.

Collaborations

Cohen has collaborated with talented individuals in the field, including Shlomo Touboul and Hanan Levin. These partnerships have fostered innovation and the sharing of ideas, further enhancing the impact of his work.

Conclusion

Cobby Cohen's contributions to cybersecurity through his patents and collaborations highlight his role as a leading inventor in the field. His innovative approaches to network security continue to shape the landscape of cybersecurity solutions.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…