{"id":30104,"date":"2024-05-09T14:57:00","date_gmt":"2024-05-09T14:57:00","guid":{"rendered":"https:\/\/sagaciousresearch.com\/blog\/?p=30104"},"modified":"2024-07-26T07:01:14","modified_gmt":"2024-07-26T07:01:14","slug":"revolutionize-ransomware-resilience-a-patent-perspective","status":"publish","type":"post","link":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective","title":{"rendered":"Revolutionize Ransomware Resilience &#8211; A Patent Perspective"},"content":{"rendered":"\n<p>These 3 tech giants have&nbsp;revolutionized ransomware resilience, so you can now&nbsp;protect your organization&#8217;s cyber security. &nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Relentless, Reckless and Ruthless<\/strong><\/p>\n\n\n\n<p>Despite the vast advancements in cyber-security we&#8217;ve made in the past decade, ransomware continues to plague us.&nbsp;<\/p>\n\n\n\n<p>It can be frustratingly resilient to our security measures, constantly mutating and wreaking havoc like the dreaded <a href=\"https:\/\/sagaciousresearch.com\/blog\/download-study-research-coronavirus-patent-non-patent-literature\/\" target=\"_blank\" rel=\"noreferrer noopener\">coronavirus<\/a>.&nbsp;<\/p>\n\n\n\n<p>This crisis demonstrates the need for more robust and innovative cyber-security solutions.&nbsp;<\/p>\n\n\n\n<p>Fortunately, owing to patents filed by&nbsp;<strong>these three tech giants<\/strong>, we can shield our organizations from ransomware with much greater efficacy today.&nbsp;<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69d765510bb48\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69d765510bb48\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#Cisco\" >Cisco<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#So_how_do_these_algorithms_work\" >So, how do these algorithms work?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#Sophos\" >Sophos<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#AI_and_Machine_Learning\" >AI and Machine Learning<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#Algorithms_that_Work_with_Existing_Antivirus\" >Algorithms that Work with Existing Antivirus<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#Emphasizing_Recovery\" >Emphasizing Recovery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#Censoring_Network_Traffic\" >Censoring Network Traffic<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#IBM\" >IBM\u00a0<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#Affiliate_Programmes\" >Affiliate Programmes&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#Backup_Tampering\" >Backup Tampering<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#Encryption_Strategies\" >Encryption Strategies<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\/#Adopting_the_Right_Protocols_can_Help_Us_Win_the_War_Against_Ransomware\" >Adopting the Right Protocols can Help Us Win the War Against Ransomware.<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cisco\"><\/span><strong>Cisco<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Select patented algorithms pioneered by <a href=\"https:\/\/www.cisco.com\/site\/in\/en\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco<\/a> (e.g., US10826783B2) are exemplary in their capabilities to glean insights from ransomware incidents. Further, they leverage these insights to enhance their proficiency in detecting and decimating all kinds of ransomware threats that could occur.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"So_how_do_these_algorithms_work\"><\/span>So, how do these algorithms work?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>These algorithms scrutinize the typical ways in which ransomware attackers transmit data during an operation. This scrutiny enables them to have a nuanced grasp of identifying and effectively combating ransomware attacks that don&#8217;t align with the usual network pattern behavior.&nbsp;<\/p>\n\n\n\n<p>Instead, their unusual behavior is instantly recognized by activities like a sudden upsurge in data traffic, atypical outbound connections, and\/or data flows that don&#8217;t comply with the network&#8217;s regular operational framework. &nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Sophos\"><\/span><strong>Sophos <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.sophos.com\/en-us\" target=\"_blank\" rel=\"noreferrer noopener\">Sophos<\/a> offers robust protection against ransomware by leveraging the latest, most powerful technology. These include:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"AI_and_Machine_Learning\"><\/span>AI and Machine Learning<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>These tools go far beyond the traditional methods of detecting cyber-security threats. They can detect the threat even before it is executed and stop it dead in its tracks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Algorithms_that_Work_with_Existing_Antivirus\"><\/span>Algorithms that Work with Existing Antivirus<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>By hyper-focusing on ransomware threats, Sophos ensures that it works with and not against your existing security measures. It acts as a bonus to your security measures so that you have the most robust system overall, wherein each measure complements the other&#8217;s capabilities.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Emphasizing_Recovery\"><\/span>Emphasizing Recovery<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>While offering some of the best-in-class pre-emptive defense against ransomware, Sophos places equal importance on recovery when an untoward event occurs, despite all the next-gen precautionary measures.&nbsp;&nbsp;<\/p>\n\n\n\n<p>So, even in the uncommon scenario of a ransomware attack, Sophos enables data recovery without needing to interact with the attackers. They attain this recovery by capturing key material used in the encryption by the ransomware.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Censoring_Network_Traffic\"><\/span>Censoring Network Traffic<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Sophos blocks unauthorized or illicit data transfer by vigilantly screening network traffic. Data exfiltration is a common precursor to ransomware encryption. So, by preventing the precursor\u2014typically in the form of data theft\u2014it significantly lowers the attackers&#8217; hold over their victims. &nbsp;<\/p>\n\n\n\n<p>The chief among these patented encryption technologies is <a href=\"https:\/\/patents.google.com\/patent\/US10750244B2\/en?oq=patent+US10750244B2\" target=\"_blank\" rel=\"noreferrer noopener\">patent US10750244B2<\/a>, but several others make Sophos one of the most powerful players in the anti-ransomware field.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"IBM\"><\/span><strong>IBM\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.ibm.com\/in-en\" target=\"_blank\" rel=\"noreferrer noopener\">IBM<\/a> also leverages AI-driven algorithms to defend against ransomware.&nbsp;<\/p>\n\n\n\n<p>It rigorously examines tactics, techniques, and procedures (TTPs) used by ransomware extortionists in the past. These TTPs include but aren&#8217;t limited to:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Affiliate_Programmes\"><\/span>Affiliate Programmes&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>These are<strong>&nbsp;<\/strong>operations in which smaller groups collaborate to share tools and tech know-how to execute attacks and consequently the profits from these malicious operations.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Backup_Tampering\"><\/span>Backup Tampering<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>To ensure complete success of operations, the attackers often tamper with the backup system, which coerces the victims into paying the ransom, as they cannot successfully restore the backup system.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Encryption_Strategies\"><\/span>Encryption Strategies<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Once they infect the system, ransomware attackers usually encrypt the data within the system and demand a ransom in exchange for the decryption keys. Moreover, sophisticated attacks also involve data theft, so the attackers can demand a ransom for the stolen data and often threaten to publicly release data as further blackmail.<\/p>\n\n\n\n<p>Fortunately, the cutting-edge <a href=\"https:\/\/sagaciousresearch.com\/blog\/ai-model-as-an-expert-real-use-cases-in-ip\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI models<\/a> patented by IBM (e.g., US10583221B1) go beyond performing a thorough analysis of these TTPs. Their AI algorithms automate and optimize response efforts to generate rapid response actions.&nbsp;<\/p>\n\n\n\n<p>From prevention through recovery, these automated response mechanisms leverage AI to minimize the deleterious impacts of these attacks and expedite recovery.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Adopting_the_Right_Protocols_can_Help_Us_Win_the_War_Against_Ransomware\"><\/span><strong>Adopting the Right Protocols can Help Us Win the War Against Ransomware.<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>So, the <a href=\"https:\/\/sagaciousresearch.com\/blog\/role-patent-information-for-small-scale-industries\/\" target=\"_blank\" rel=\"noreferrer noopener\">role of patents<\/a> in cyber security goes beyond simply protecting intellectual property; it represents a constantly evolving cycle of improvement gleaned by insights from real-world cyber incidents, assisted by AI and other technological advancements.<\/p>\n\n\n\n<p>By using this multi-pronged approach to their advantage, cyber security practitioners can hone their defense mechanisms to be more effective against the progressing tactics of ransomware actors.<\/p>\n\n\n\n<p>Cybersecurity practitioners can stay several steps ahead in the current battle against ransomware and other cyber threats by adopting a proactive approach to innovation. <\/p>\n\n\n\n<p><strong>&#8211; <em>By The Editorial Team<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>These 3 tech giants have&nbsp;revolutionized ransomware resilience, so you can now&nbsp;protect your organization&#8217;s cyber security. &nbsp;&nbsp;&nbsp; Relentless, Reckless and Ruthless Despite the vast advancements in cyber-security we&#8217;ve made in the past decade, ransomware continues&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":30162,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"coauthors":[983],"class_list":["post-30104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Revolutionize Ransomware Resilience - A Patent Perspective - Sagacious IP<\/title>\n<meta name=\"description\" content=\"Thanks to patents from these three tech giants, ransomware resilience has been revolutionized, improving our ability to protect organizations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Revolutionize Ransomware Resilience - A Patent Perspective - Sagacious IP\" \/>\n<meta property=\"og:description\" content=\"Thanks to patents from these three tech giants, ransomware resilience has been revolutionized, improving our ability to protect organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\" \/>\n<meta property=\"og:site_name\" content=\"Sagacious IP\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-09T14:57:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-26T07:01:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware11.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vilas Karnake\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vilas Karnake\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#article\",\"isPartOf\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\"},\"author\":{\"name\":\"Vilas Karnake\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/ee18415b4ec48919d929dd9732c9749f\"},\"headline\":\"Revolutionize Ransomware Resilience &#8211; A Patent Perspective\",\"datePublished\":\"2024-05-09T14:57:00+00:00\",\"dateModified\":\"2024-07-26T07:01:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\"},\"wordCount\":789,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware11.jpeg\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\",\"url\":\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\",\"name\":\"Revolutionize Ransomware Resilience - A Patent Perspective - Sagacious IP\",\"isPartOf\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware11.jpeg\",\"datePublished\":\"2024-05-09T14:57:00+00:00\",\"dateModified\":\"2024-07-26T07:01:14+00:00\",\"description\":\"Thanks to patents from these three tech giants, ransomware resilience has been revolutionized, improving our ability to protect organizations.\",\"breadcrumb\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#primaryimage\",\"url\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware11.jpeg\",\"contentUrl\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware11.jpeg\",\"width\":2000,\"height\":1333,\"caption\":\"ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sagaciousresearch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Revolutionize Ransomware Resilience &#8211; A Patent Perspective\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#website\",\"url\":\"https:\/\/sagaciousresearch.com\/blog\/\",\"name\":\"Sagacious IP\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sagaciousresearch.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#organization\",\"name\":\"Sagacious IP\",\"url\":\"https:\/\/sagaciousresearch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2022\/06\/cropped-cropped-cropped-sagacious-ip-logo80-1-1.png\",\"contentUrl\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2022\/06\/cropped-cropped-cropped-sagacious-ip-logo80-1-1.png\",\"width\":481,\"height\":80,\"caption\":\"Sagacious IP\"},\"image\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/ee18415b4ec48919d929dd9732c9749f\",\"name\":\"Vilas Karnake\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/image\/d7edb6a9166e3680603701ae9e10e107\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/363be32d5f469b83f76184b09a333c02c746a62144121a8dcfc89b20ff076462?s=96&d=initials&r=g&initials=vk\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/363be32d5f469b83f76184b09a333c02c746a62144121a8dcfc89b20ff076462?s=96&d=initials&r=g&initials=vk\",\"caption\":\"Vilas Karnake\"},\"url\":\"https:\/\/sagaciousresearch.com\/blog\/author\/adm.vkarnake\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Revolutionize Ransomware Resilience - A Patent Perspective - Sagacious IP","description":"Thanks to patents from these three tech giants, ransomware resilience has been revolutionized, improving our ability to protect organizations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective","og_locale":"en_US","og_type":"article","og_title":"Revolutionize Ransomware Resilience - A Patent Perspective - Sagacious IP","og_description":"Thanks to patents from these three tech giants, ransomware resilience has been revolutionized, improving our ability to protect organizations.","og_url":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective","og_site_name":"Sagacious IP","article_published_time":"2024-05-09T14:57:00+00:00","article_modified_time":"2024-07-26T07:01:14+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware11.jpeg","type":"image\/jpeg"}],"author":"Vilas Karnake","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vilas Karnake","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#article","isPartOf":{"@id":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective"},"author":{"name":"Vilas Karnake","@id":"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/ee18415b4ec48919d929dd9732c9749f"},"headline":"Revolutionize Ransomware Resilience &#8211; A Patent Perspective","datePublished":"2024-05-09T14:57:00+00:00","dateModified":"2024-07-26T07:01:14+00:00","mainEntityOfPage":{"@id":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective"},"wordCount":789,"commentCount":0,"publisher":{"@id":"https:\/\/sagaciousresearch.com\/blog\/#organization"},"image":{"@id":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#primaryimage"},"thumbnailUrl":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware11.jpeg","articleSection":["Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective","url":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective","name":"Revolutionize Ransomware Resilience - A Patent Perspective - Sagacious IP","isPartOf":{"@id":"https:\/\/sagaciousresearch.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#primaryimage"},"image":{"@id":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#primaryimage"},"thumbnailUrl":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware11.jpeg","datePublished":"2024-05-09T14:57:00+00:00","dateModified":"2024-07-26T07:01:14+00:00","description":"Thanks to patents from these three tech giants, ransomware resilience has been revolutionized, improving our ability to protect organizations.","breadcrumb":{"@id":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#primaryimage","url":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware11.jpeg","contentUrl":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware11.jpeg","width":2000,"height":1333,"caption":"ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/sagaciousresearch.com\/blog\/revolutionize-ransomware-resilience-a-patent-perspective#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sagaciousresearch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Revolutionize Ransomware Resilience &#8211; A Patent Perspective"}]},{"@type":"WebSite","@id":"https:\/\/sagaciousresearch.com\/blog\/#website","url":"https:\/\/sagaciousresearch.com\/blog\/","name":"Sagacious IP","description":"Blog","publisher":{"@id":"https:\/\/sagaciousresearch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sagaciousresearch.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sagaciousresearch.com\/blog\/#organization","name":"Sagacious IP","url":"https:\/\/sagaciousresearch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2022\/06\/cropped-cropped-cropped-sagacious-ip-logo80-1-1.png","contentUrl":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2022\/06\/cropped-cropped-cropped-sagacious-ip-logo80-1-1.png","width":481,"height":80,"caption":"Sagacious IP"},"image":{"@id":"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/ee18415b4ec48919d929dd9732c9749f","name":"Vilas Karnake","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/image\/d7edb6a9166e3680603701ae9e10e107","url":"https:\/\/secure.gravatar.com\/avatar\/363be32d5f469b83f76184b09a333c02c746a62144121a8dcfc89b20ff076462?s=96&d=initials&r=g&initials=vk","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/363be32d5f469b83f76184b09a333c02c746a62144121a8dcfc89b20ff076462?s=96&d=initials&r=g&initials=vk","caption":"Vilas Karnake"},"url":"https:\/\/sagaciousresearch.com\/blog\/author\/adm.vkarnake"}]}},"_links":{"self":[{"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/posts\/30104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/comments?post=30104"}],"version-history":[{"count":18,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/posts\/30104\/revisions"}],"predecessor-version":[{"id":30748,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/posts\/30104\/revisions\/30748"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/media\/30162"}],"wp:attachment":[{"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/media?parent=30104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/categories?post=30104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/tags?post=30104"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/categories?post=30104"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/coauthors?post=30104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}