Company Filing History:
Years Active: 2018
Title: **Innovator Mohammad Waseem: Pioneering Attack Trajectory Detection**
Introduction
Mohammad Waseem is an inventive mind based in Bengaluru, India, known for his innovative work in cybersecurity. With a keen focus on enhancing network protection, Waseem has developed a significant patent that contributes to the detection and tracking of adversary trajectories in network attacks.
Latest Patents
Waseem holds one patent, titled "Systems and methods for detecting and tracking adversary trajectory." This patent addresses the utilization of network flow information to ascertain the trajectory of potential attacks. The process involves generating an adjacency data structure for a network, which captures interactions between machines within that network. By employing deception mechanisms that signal an attack when engaged, the patent outlines a method to collate attack trajectory information. This information is derived from interactions with deception mechanisms, further intertwining the interaction data of the network and the details of each machine, ultimately determining a possible adversary trajectory.
Career Highlights
Currently, Waseem is associated with Acalvio Technologies, Inc., a company that specializes in innovative cybersecurity solutions. His work directly contributes to advancing the techniques used to safeguard networks from adversarial threats. The depth of his knowledge and experience in this field solidifies his reputation as a forward-thinking inventor.
Collaborations
At Acalvio Technologies, Waseem collaborates with talented individuals such as Satnam Singh and Suril Rajul Desai. Together, they are pushing the boundaries of technology to enhance the effectiveness of cybersecurity measures and protect networks from evolving threats.
Conclusion
Mohammad Waseem exemplifies the spirit of innovation in the arena of cybersecurity through his groundbreaking patent on adversary trajectory detection. His work not only stands to influence the field significantly but also contributes to the broader efforts of securing digital environments against potential attacks.