
The debate over “multistakeholderism”
A CircleID post by Alexander Klimburg takes aim at my article, “The Power to Govern Ourselves,” delivered at the Gig-Arts conference in June. That speech, avaiable here on the blog, argued that “Multistakeholder does not describe a governance model. It…
Digital Assets Series: Part 4 | The European Central Bank’s Attack on Bitcoin
In October 2024, Senior Management of the European Central Bank (ECB) Market Infrastructure and Payments division published a hit piece on Bitcoin. The Federal Reserve Bank of Minneapolis followed suit shortly thereafter. The ECB paper provides an overdue perspective on…
Authoritarianism Goes Digital: The EUI Conference
A conference devoted to challenging “digital authoritarianism” is something that IGP can certainly get behind. But what is digital authoritarianism, and was it really being challenged in Italy on October 28 and 29? At the meeting “Decrypting Digital Authoritarianism: How…
8 Vulnerability Dashboard examples used by customers
Threat Intelligence8 Vulnerability Dashboard examples used by customersCustomization filters and display optionsFeedly’s Vulnerability Dashboard enables you to filter CVEs easily to create a view that meets your intelligence requirements or risk criteria.Filters are created using boolean logic (AND/OR/NOT) against different…
Feedly AI now extracts IoCs from external links: Minimize missed threats
Threat IntelligenceFeedly AI now extracts IoCs from external links: Minimize missed threatsSeamless integration with Github, TrendMicro, and CERT-FRMany threat reports don’t embed IoCs directly but instead link to external files. Previously, Feedly AI didn’t capture these IoCs, causing potential gaps…
AI Actions prompt: Threat hunt hypothesis generation
FundamentalsAI Actions prompt: Threat hunt hypothesis generationExtract procedures from articles to inform threat hunt planningDescriptionThis AI Actions prompt creates a threat hunt hypotheses in a tabular format that’s easy to read and integrate into reports or presentations. The hypotheses are…
AI governance workshop summary
The image projected by Viktor Mayer-Schönberger summed up the AI governance dialogue perfectly. It was a gigantic motorcycle driver barreling around a curve. The image was used to represent someone “who doesn’t know where he is going, but wants to…
Caught in the Crossfire: The Impact of Sanctions on Iranian Internet Users
In the digital landscape of Iran, citizens find themselves trapped between a hammer and an anvil—on one side, external sanctions crush their access to the global digital economy, while on the other, their own government’s policies lock them into a…
Encryption Under Siege in India: National Security & the Erosion of Digital Privacy
Today (October 21, 2024) is Global Encryption Day. IGP participates in this worldwide event as Saumya Jain and Jyoti Panday examine India’s evolving assaults on private communications. End-to-end (E2E) encryption ensures that only the sender’s and recipient’s devices have access…
New Feedly AI Actions: Faster summaries, data extraction, and deliverables
Market IntelligenceNew Feedly AI Actions: Faster summaries, data extraction, and deliverablesGrounded in your trusted sources for reliable results15 sec-summaryBuilding market intelligence reports is time-consuming: hours spent reading, extracting insights, and formatting. Generic AI tools often fall short with cookie-cutter, outdated,…