CYBERPIKE
Mark Identification

CYBERPIKE

Serial Number

97743157

Filing Date

Jan 5, 2023

Trademark by

BATTELLE MEMORIAL INSTITUTE

Classification Information

Providing information on the topic of cyber security for operational critical systems, cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise and technical writing for others in the field of the aforementioned topics; providing information in the field of cyber security tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks; providing information and technical advice related to the operation of computers in the field of network defense and prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; computer network security consultancy, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications, namely, mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems, and technical writing for others in the field of the aforementioned topics; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications, namely, mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and technical writing for others in the field of the aforementioned topics; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; research in the field of cyber intelligence technology and cyber security technology; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability

Computer and Scientific