TTP Dashboard: Discover trending threat actor behavior
Threat IntelligenceTTP Dashboard: Discover trending threat actor behaviorPrioritize threat hunts, prepare mitigations, and create threat actor profiles.15 Sec-summaryIdentifying new threat actor behavior is tedious and resource-intensive, requiring focused reading to tag text in articles to MITRE ATT&CK and manually extract…
Public and Private Power in Internet Content Regulation: ICANN and Registry “Voluntary” Commitments
Is censorship something that only happens when state actors do it, or can private actors engage in it as well? That crucial Internet governance debate is taking place in two venues: The U.S. Supreme Court, which will rule on two…
The Dutch in the grip of Internet nationalism
The Netherlands has a reputation for being a liberal, broad-minded place that is open to the world. Its scholars in Internet governance have emphasized the need for a globally recognized “public core” of the Internet. But apparently the virus of…
Track sustainability and climate-related regulations
Market IntelligenceTrack sustainability and climate-related regulationsStay on top of environmental policies as they are debated, adopted, and implemented.15 sec-summarySustainability and climate-related laws are rapidly evolving, with new regulations discussed and adopted daily. This can leave businesses struggling to stay ahead….
Understanding National Security in a Digital Age: Summary of IGP’s 8th Annual Workshop
On November 10, 2023, we convened a diverse group of experts at the National Academies of Sciences in Washington D.C. for our 8th Annual Workshop. Our goal? To examine the critical question: what should national security look like in a…
Monitor use cases of emerging technologies
Market IntelligenceMonitor use cases of emerging technologiesStay up to date with technological advancements and technology use cases in your industry15-second summaryTechnological processes are accelerating so fast that it’s difficult to identify tangible ways that emerging tech can be incorporated into…
Ingest threat data with context from Feedly TI to EclecticIQ
Threat IntelligenceIngest threat data with context from Feedly TI to EclecticIQFeedly introduces no-code integration with EclecticIQ15-second summaryEclecticIQ’s Intelligence Center helps teams correlate, visualize, and take action on vast threat intelligence data acquired from internal, commercial, and open sources. However, collecting…
Meet Feedly AI for Market Intelligence
Market IntelligenceMeet Feedly AI for Market IntelligenceThe fastest way to collect and share actionable insights from across the webWhat is Feedly AI?If you’ve spent time manually tracking and researching specific companies, technologies, emerging industry trends, and other topics across the…
Send intelligence briefs with Automated Newsletters
Threat IntelligenceSend intelligence briefs with Automated NewslettersCollect, analyze, and share timely intelligence on the threat landscape.15 second summaryAutomated Newsletters continuously pull content from your Feedly to send timely intelligence on the threat landscape to your C-suite, SOC, vulnerability team, and…
Here’s why 2023 wasn’t a Happy New Year
The year 2023 was a notable one in digital governance. A retrograde tendency by nation-states to pursue “digital sovereignty” peaked in Europe, China and the U.S., leading to numerous governmental barriers and restrictions on data, networks, computing devices and software…