Using AI to sort technical updates from news commentary during the SolarWinds attack: A case study
Case Study How one cybersecurity analyst leveraged Feedly to proactively evaluate news around the breach and protect his company and their clients and stakeholders Back in 2020, it wasn’t hard to find information about the SolarWinds breach. In fact, the…
How a WillowTree cybersecurity analyst gathers threat intelligence in just 30 minutes a day
Case Study Drew Gallis, analyst at WillowTree, leverages Feedly for Cybersecurity to track cyber threats across the company’s supply chain and protect clients ImpactKeeps track of critical vulnerabilities in the supply chain so he can react quickly.Went from spending 2-3…
Chinese Data Nationalism Targets Didi Platform
A week after the close of our conference comparing platform governance in the US and China, the Chinese government took another strong action to subordinate one of its major private platform companies. This time it was Didi Chuxing, China’s dominant…
Easily track cyber attacks across your industry and supply chain
New Feature Leo understands all types of cyber attacks and can track them for you The only constant in the realm of cyber security is change; hackers are continuously maturing and becoming more sophisticated, attack patterns are constantly evolving, and…
Research critical vulnerabilities with the Leo CVE Dashboard
New Feature Contextualized CVE information for faster threat research, without the overwhelm Cyber attacks are increasing in volume and sophistication across every industry and category, leaving threat analysts and frontline security teams faced with a flood of information. The consequences…
The new Cybersecurity Trending Dashboard (beta)
An at-a-glance overview of the evolving cybersecurity threat landscape Keeping up with the most critical threats, vulnerabilities, and threat actors can be time consuming and overwhelming. We have been working with some existing Feedly for Cybersecurity customers to create a…