AI in Threat Intelligence Newsletters: Faster creation, bigger impact
Threat IntelligenceAI in Threat Intelligence Newsletters: Faster creation, bigger impactAnalyze and personalize threat intel faster with help from AI.15-Second summaryCreating threat intel newsletters involves more than collecting relevant information. You need to summarize key concepts, extract TTPs (Tactics, Techniques, and…
Meet your new sidebar : Less clutter, more personalization
FundamentalsMeet your new sidebar : Less clutter, more personalizationYes, we moved your cheese, but you can move it back15-Second summaryChange is hard, but these changes are worth it. We have revised the Feedly sidebar and eliminated the dock to create…
Malware Category AI Models: Track malware types with ease
Threat IntelligenceMalware Category AI Models: Track malware types with easeDetect emerging threats, map malware behaviors, and prioritize risk-based defenses15-Second summaryMalware categories often share common behaviors, such as ransomware encrypting files or botnets communicating with command-and-control servers. Feedly’s new AI Models…
Follow Bluesky users, and Bluesky feeds in Feedly
FundamentalsFollow Bluesky users, and Bluesky feeds in FeedlyAvailable for all Feedly product tiers15-Second summaryBluesky is gaining traction as an alternative social media platform, partly because users have more control over the algorithm dictating the content they see. All Feedly accounts,…
Simplify threat intelligence workflows with Feedly & Anomali
Threat IntelligenceSimplify threat intelligence workflows with Feedly & AnomaliDeliver enriched, relevant intelligence directly into ThreatStream to accelerate investigations and strengthen defenses15-sec summaryFeedly’s integration with Anomali ThreatStream simplifies and accelerates threat intelligence workflows by directly delivering highly relevant intelligence into your…
Feedly Patch Tuesday Report: Searchable, scannable, and exportable
Threat IntelligenceFeedly Patch Tuesday Report: Searchable, scannable, and exportableFilter and prioritize vulnerabilities in seconds—a free resource for all15-Second summaryKeeping up with Microsoft’s Patch Tuesday releases is time-consuming for analysts, who need to assess vulnerabilities quickly, determine their relevance and criticality,…
Top Stories: Discover and monitor emerging threats
Threat IntelligenceTop Stories: Discover and monitor emerging threatsNew Top Stories AI Model and Top Stories Tab15-Second summaryDrowning in threat intelligence noise and struggling to identify high-impact risks that truly matter to your organization?We trained Feedly AI to continuously read and…
8 Vulnerability Dashboard examples used by customers
Threat Intelligence8 Vulnerability Dashboard examples used by customersCustomization filters and display optionsFeedly’s Vulnerability Dashboard enables you to filter CVEs easily to create a view that meets your intelligence requirements or risk criteria.Filters are created using boolean logic (AND/OR/NOT) against different…
Vulnerability Dashboard: Real-time CVE intelligence tailored to your stack and risk criteria
Threat IntelligenceVulnerability Dashboard: Real-time CVE intelligence tailored to your stack and risk criteriaDiscover, triage, analyze, and prioritize high-risk CVEs faster with Feedly AI15-Second SummaryKeeping up with critical vulnerabilities means dealing with constant updates from multiple sources, excessive noise, delayed CVSS…
Track adversary behavior in real-time with Threat Actor Insights Cards
Threat IntelligenceTrack adversary behavior in real-time with Threat Actor Insights Cards Accelerate threat actor profiling15 sec-summaryUnderstanding your adversaries’ tactics, techniques, and procedures is fundamental to securing your attack surface. Your threat actor profiles should reflect recent and historical activity, target…