Prompt engineering: Extract customized CVE scoring
Threat IntelligencePrompt engineering: Extract customized CVE scoringAssign a custom risk score to CVEs based on your company’s criteriaCustom vulnerability scoring often requires teams to manually combine data from multiple metrics, such as CVSS scores, exploit and patch availability, and recency…
Top Stories: Discover and monitor emerging threats
Threat IntelligenceTop Stories: Discover and monitor emerging threatsNew Top Stories AI Model and Top Stories Tab15-Second summaryDrowning in threat intelligence noise and struggling to identify high-impact risks that truly matter to your organization?We trained Feedly AI to continuously read and…
Enhanced newsletter formatting: Create professional on-brand newsletters
FundamentalsEnhanced newsletter formatting: Create professional on-brand newslettersEffortlessly set your brand’s style and highlight key insights for quick, professional newsletters15-Second summaryCreate brand-compliant, professional newsletters with new formatting options that can be saved as presets for Feedly Automated Newsletters.With this update, now…
Prompt engineering: Communicate attack flows
Threat IntelligencePrompt engineering: Communicate attack flowsEmpower your team with visual attack insightsWith Ask AI, Cyber Threat Intelligence Analysts can quickly generate workflow diagrams that detail complex attack sequences. These diagrams, based on the article(s) provided, are designed to help Threat…
New Emerging Trends Dashboard: Find the next big thing
Market IntelligenceNew Emerging Trends Dashboard: Find the next big thingLet Feedly wade through the sea of weak signals to surface the trends as they emerge15-Sec summaryDiscovering emerging trends takes days of manual work, and it is hard to separate fads…
IGP at AoIR 2024
From October 30 to November 2nd, the 2024 Association of Internet Researchers (AoIR) conference was held at the University of Sheffield in Sheffield, United Kingdom. This year marked the 25th anniversary of the AoIR conference, which set a record as…
The debate over “multistakeholderism”
A CircleID post by Alexander Klimburg takes aim at my article, “The Power to Govern Ourselves,” delivered at the Gig-Arts conference in June. That speech, avaiable here on the blog, argued that “Multistakeholder does not describe a governance model. It…
Digital Assets Series: Part 4 | The European Central Bank’s Attack on Bitcoin
In October 2024, Senior Management of the European Central Bank (ECB) Market Infrastructure and Payments division published a hit piece on Bitcoin. The Federal Reserve Bank of Minneapolis followed suit shortly thereafter. The ECB paper provides an overdue perspective on…
Authoritarianism Goes Digital: The EUI Conference
A conference devoted to challenging “digital authoritarianism” is something that IGP can certainly get behind. But what is digital authoritarianism, and was it really being challenged in Italy on October 28 and 29? At the meeting “Decrypting Digital Authoritarianism: How…
8 Vulnerability Dashboard examples used by customers
Threat Intelligence8 Vulnerability Dashboard examples used by customersCustomization filters and display optionsFeedly’s Vulnerability Dashboard enables you to filter CVEs easily to create a view that meets your intelligence requirements or risk criteria.Filters are created using boolean logic (AND/OR/NOT) against different…