Prompt engineering: Communicate attack flows
Threat IntelligencePrompt engineering: Communicate attack flowsEmpower your team with visual attack insightsWith Ask AI, Cyber Threat Intelligence Analysts can quickly generate workflow diagrams that detail complex attack sequences. These diagrams, based on the article(s) provided, are designed to help Threat…
New Emerging Trends Dashboard: Find the next big thing
Market IntelligenceNew Emerging Trends Dashboard: Find the next big thingLet Feedly wade through the sea of weak signals to surface the trends as they emerge15-Sec summaryDiscovering emerging trends takes days of manual work, and it is hard to separate fads…
IGP at AoIR 2024
From October 30 to November 2nd, the 2024 Association of Internet Researchers (AoIR) conference was held at the University of Sheffield in Sheffield, United Kingdom. This year marked the 25th anniversary of the AoIR conference, which set a record as…
The debate over “multistakeholderism”
A CircleID post by Alexander Klimburg takes aim at my article, “The Power to Govern Ourselves,” delivered at the Gig-Arts conference in June. That speech, avaiable here on the blog, argued that “Multistakeholder does not describe a governance model. It…
Digital Assets Series: Part 4 | The European Central Bank’s Attack on Bitcoin
In October 2024, Senior Management of the European Central Bank (ECB) Market Infrastructure and Payments division published a hit piece on Bitcoin. The Federal Reserve Bank of Minneapolis followed suit shortly thereafter. The ECB paper provides an overdue perspective on…
Authoritarianism Goes Digital: The EUI Conference
A conference devoted to challenging “digital authoritarianism” is something that IGP can certainly get behind. But what is digital authoritarianism, and was it really being challenged in Italy on October 28 and 29? At the meeting “Decrypting Digital Authoritarianism: How…
8 Vulnerability Dashboard examples used by customers
Threat Intelligence8 Vulnerability Dashboard examples used by customersCustomization filters and display optionsFeedly’s Vulnerability Dashboard enables you to filter CVEs easily to create a view that meets your intelligence requirements or risk criteria.Filters are created using boolean logic (AND/OR/NOT) against different…