IGF Mauritius

Internet Governance Forum Mauritius

Month: November 2024

threat intelligence

Prompt engineering: Communicate attack flows

Threat IntelligencePrompt engineering: Communicate attack flowsEmpower your team with visual attack insightsWith Ask AI, Cyber Threat Intelligence Analysts can quickly generate workflow diagrams that detail complex attack sequences. These diagrams, based on the article(s) provided, are designed to help Threat…

Market Intelligence

New Emerging Trends Dashboard: Find the next big thing

Market IntelligenceNew Emerging Trends Dashboard: Find the next big thingLet Feedly wade through the sea of weak signals to surface the trends as they emerge15-Sec summaryDiscovering emerging trends takes days of manual work, and it is hard to separate fads…

Cybersecurity General Generative AI

IGP at AoIR 2024

From October 30 to November 2nd, the 2024 Association of Internet Researchers (AoIR) conference was held at the University of Sheffield in Sheffield, United Kingdom. This year marked the 25th anniversary of the AoIR conference, which set a record as…

Geopolitics of IG IG Institutions

The debate over “multistakeholderism”

A CircleID post by Alexander Klimburg takes aim at my article, “The Power to Govern Ourselves,” delivered at the Gig-Arts conference in June. That speech, avaiable here on the blog, argued that “Multistakeholder does not describe a governance model. It…

Digital Assets Series: Part 4 | The European Central Bank’s Attack on Bitcoin

In October 2024, Senior Management of the European Central Bank (ECB) Market Infrastructure and Payments division published a hit piece on Bitcoin. The Federal Reserve Bank of Minneapolis followed suit shortly thereafter. The ECB paper provides an overdue perspective on…

Digital Trade Free Expression Online Geopolitics of IG Platform Governance Privacy & Surveillance

Authoritarianism Goes Digital: The EUI Conference

A conference devoted to challenging “digital authoritarianism” is something that IGP can certainly get behind. But what is digital authoritarianism, and was it really being challenged in Italy on October 28 and 29? At the meeting “Decrypting Digital Authoritarianism: How…

threat intelligence

8 Vulnerability Dashboard examples used by customers

Threat Intelligence8 Vulnerability Dashboard examples used by customersCustomization filters and display optionsFeedly’s Vulnerability Dashboard enables you to filter CVEs easily to create a view that meets your intelligence requirements or risk criteria.Filters are created using boolean logic (AND/OR/NOT) against different…