IGF Mauritius

Internet Governance Forum Mauritius

cybersecurity-only

cybersecurity-only Star feature threat intelligence

Get a 360° view of malware and ransomware in minutes with Malware Insights Cards

Threat IntelligenceGet a 360° view of malware and ransomware in minutes with Malware Insights CardsJumpstart analysis with summaries, trends, threat actor links, CVEs, TTPs, and reports.15 sec-summaryUnderstanding malware can be exhausting, requiring research, code analysis, behavioral analysis, and more. Getting…

cybersecurity-only Star feature threat intelligence

Feedly and Cyware: Rich context for faster analysis

Threat IntelligenceFeedly and Cyware: Rich context for faster analysisImprove analyst productivity and accelerate action.15-second summaryCyware’s CTIX and Orchestrate help teams analyze, collaborate, and orchestrate actions on threat intelligence data acquired from commercial and open sources. However, Cyware users need their…

cybersecurity-only Star feature threat intelligence

TTP Dashboard: Discover trending threat actor behavior

Threat IntelligenceTTP Dashboard: Discover trending threat actor behaviorPrioritize threat hunts, prepare mitigations, and create threat actor profiles.15 Sec-summaryIdentifying new threat actor behavior is tedious and resource-intensive, requiring focused reading to tag text in articles to MITRE ATT&CK and manually extract…

cybersecurity-only Star feature threat intelligence

Ingest threat data with context from Feedly TI to EclecticIQ

Threat IntelligenceIngest threat data with context from Feedly TI to EclecticIQFeedly introduces no-code integration with EclecticIQ15-second summaryEclecticIQ’s Intelligence Center helps teams correlate, visualize, and take action on vast threat intelligence data acquired from internal, commercial, and open sources. However, collecting…

cybersecurity-only Star feature threat intelligence

Send intelligence briefs with Automated Newsletters

Threat IntelligenceSend intelligence briefs with Automated NewslettersCollect, analyze, and share timely intelligence on the threat landscape.15 second summaryAutomated Newsletters continuously pull content from your Feedly to send timely intelligence on the threat landscape to your C-suite, SOC, vulnerability team, and…

cybersecurity-only Star feature threat intelligence

Scale up MISP: Automatically collect and ingest IoCs with Feedly TI

Threat IntelligenceScale up MISP: Automatically collect and ingest IoCs with Feedly TIIncludes rich context like threat actors, malware, vulnerabilities, and TTPs15-second summaryMISP is a powerful platform for storing and distributing cyber threat intelligence, including indicators of compromise (IoCs). However, without…

cybersecurity-only Star feature threat intelligence

Know your enemy: Collect and share threat actor intelligence

Threat IntelligenceKnow your enemy: Collect and share threat actor intelligenceTTPs, IoCs, Malware, MITRE ATT&CK15-second summaryThreat actor groups number in the hundreds, are well-resourced, and employ highly evolved tactics and techniques. Knowing which threat actors are targeting your industry and their…

cybersecurity-only Star feature threat intelligence

Collect and share actionable malware intelligence with Feedly AI Feeds

Threat IntelligenceCollect and share actionable malware intelligence with Feedly AI FeedsIdentify IoCs, TTPs, threat actors, and more to share with your team and toolsThere are over one billion malware software programs in existence today. How do you discover, monitor, and…

cybersecurity-only Star feature threat intelligence

Track Detection Rules Across the Web with Feedly AI

Threat IntelligenceTrack Detection Rules Across the Web with Feedly AIAutomatically collect and download Sigma, Yara, Snort, and Microsoft hunting queries with Feedly AIMillions of security threats could potentially impact your business on any given day. Manual approaches to detection and…

Discover proof of exploits early

Threat Intelligence Track emerging exploits across the Web with Feedly’s AI Engine Does your team track emerging exploits across cybersecurity websites, code repositories, and social media sites? We just released a new Proof of Exploit Leo Concept that I think…