IGF Mauritius

Internet Governance Forum Mauritius

Shawn Jaques

threat intelligence

AI in Threat Intelligence Newsletters: Faster creation, bigger impact

Threat IntelligenceAI in Threat Intelligence Newsletters: Faster creation, bigger impactAnalyze and personalize threat intel faster with help from AI.15-Second summaryCreating threat intel newsletters involves more than collecting relevant information. You need to summarize key concepts, extract TTPs (Tactics, Techniques, and…

Fundamentals

Meet your new sidebar : Less clutter, more personalization

FundamentalsMeet your new sidebar : Less clutter, more personalizationYes, we moved your cheese, but you can move it back15-Second summaryChange is hard, but these changes are worth it. We have revised the Feedly sidebar and eliminated the dock to create…

threat intelligence

Malware Category AI Models: Track malware types with ease

Threat IntelligenceMalware Category AI Models: Track malware types with easeDetect emerging threats, map malware behaviors, and prioritize risk-based defenses15-Second summaryMalware categories often share common behaviors, such as ransomware encrypting files or botnets communicating with command-and-control servers. Feedly’s new AI Models…

Fundamentals

Follow Bluesky users, and Bluesky feeds in Feedly

FundamentalsFollow Bluesky users, and Bluesky feeds in FeedlyAvailable for all Feedly product tiers15-Second summaryBluesky is gaining traction as an alternative social media platform, partly because users have more control over the algorithm dictating the content they see. All Feedly accounts,…

threat intelligence

Simplify threat intelligence workflows with Feedly & Anomali

Threat IntelligenceSimplify threat intelligence workflows with Feedly & AnomaliDeliver enriched, relevant intelligence directly into ThreatStream to accelerate investigations and strengthen defenses15-sec summaryFeedly’s integration with Anomali ThreatStream simplifies and accelerates threat intelligence workflows by directly delivering highly relevant intelligence into your…

threat intelligence

Feedly Patch Tuesday Report: Searchable, scannable, and exportable

Threat IntelligenceFeedly Patch Tuesday Report: Searchable, scannable, and exportableFilter and prioritize vulnerabilities in seconds—a free resource for all15-Second summaryKeeping up with Microsoft’s Patch Tuesday releases is time-consuming for analysts, who need to assess vulnerabilities quickly, determine their relevance and criticality,…

threat intelligence

Top Stories: Discover and monitor emerging threats

Threat IntelligenceTop Stories: Discover and monitor emerging threatsNew Top Stories AI Model and Top Stories Tab15-Second summaryDrowning in threat intelligence noise and struggling to identify high-impact risks that truly matter to your organization?We trained Feedly AI to continuously read and…

threat intelligence

8 Vulnerability Dashboard examples used by customers

Threat Intelligence8 Vulnerability Dashboard examples used by customersCustomization filters and display optionsFeedly’s Vulnerability Dashboard enables you to filter CVEs easily to create a view that meets your intelligence requirements or risk criteria.Filters are created using boolean logic (AND/OR/NOT) against different…

threat intelligence

Vulnerability Dashboard: Real-time CVE intelligence tailored to your stack and risk criteria

Threat IntelligenceVulnerability Dashboard: Real-time CVE intelligence tailored to your stack and risk criteriaDiscover, triage, analyze, and prioritize high-risk CVEs faster with Feedly AI15-Second SummaryKeeping up with critical vulnerabilities means dealing with constant updates from multiple sources, excessive noise, delayed CVSS…

threat intelligence

Track adversary behavior in real-time with Threat Actor Insights Cards

Threat IntelligenceTrack adversary behavior in real-time with Threat Actor Insights Cards Accelerate threat actor profiling15 sec-summaryUnderstanding your adversaries’ tactics, techniques, and procedures is fundamental to securing your attack surface. Your threat actor profiles should reflect recent and historical activity, target…