IGF Mauritius

Internet Governance Forum Mauritius

threat intelligence

Prompt engineering: Communicate attack flows

Threat IntelligencePrompt engineering: Communicate attack flowsEmpower your team with visual attack insightsWith Ask AI, Cyber Threat Intelligence Analysts can quickly generate workflow diagrams that detail complex attack sequences. These diagrams, based on the article(s) provided, are designed to help Threat…

Market Intelligence

New Emerging Trends Dashboard: Find the next big thing

Market IntelligenceNew Emerging Trends Dashboard: Find the next big thingLet Feedly wade through the sea of weak signals to surface the trends as they emerge15-Sec summaryDiscovering emerging trends takes days of manual work, and it is hard to separate fads…

Cybersecurity General Generative AI

IGP at AoIR 2024

From October 30 to November 2nd, the 2024 Association of Internet Researchers (AoIR) conference was held at the University of Sheffield in Sheffield, United Kingdom. This year marked the 25th anniversary of the AoIR conference, which set a record as…

Geopolitics of IG IG Institutions

The debate over “multistakeholderism”

A CircleID post by Alexander Klimburg takes aim at my article, “The Power to Govern Ourselves,” delivered at the Gig-Arts conference in June. That speech, avaiable here on the blog, argued that “Multistakeholder does not describe a governance model. It…

Digital Assets Series: Part 4 | The European Central Bank’s Attack on Bitcoin

In October 2024, Senior Management of the European Central Bank (ECB) Market Infrastructure and Payments division published a hit piece on Bitcoin. The Federal Reserve Bank of Minneapolis followed suit shortly thereafter. The ECB paper provides an overdue perspective on…

Digital Trade Free Expression Online Geopolitics of IG Platform Governance Privacy & Surveillance

Authoritarianism Goes Digital: The EUI Conference

A conference devoted to challenging “digital authoritarianism” is something that IGP can certainly get behind. But what is digital authoritarianism, and was it really being challenged in Italy on October 28 and 29? At the meeting “Decrypting Digital Authoritarianism: How…

threat intelligence

8 Vulnerability Dashboard examples used by customers

Threat Intelligence8 Vulnerability Dashboard examples used by customersCustomization filters and display optionsFeedly’s Vulnerability Dashboard enables you to filter CVEs easily to create a view that meets your intelligence requirements or risk criteria.Filters are created using boolean logic (AND/OR/NOT) against different…

threat intelligence

Feedly AI now extracts IoCs from external links: Minimize missed threats

Threat IntelligenceFeedly AI now extracts IoCs from external links: Minimize missed threatsSeamless integration with Github, TrendMicro, and CERT-FRMany threat reports don’t embed IoCs directly but instead link to external files. Previously, Feedly AI didn’t capture these IoCs, causing potential gaps…

Fundamentals

AI Actions prompt: Threat hunt hypothesis generation

FundamentalsAI Actions prompt: Threat hunt hypothesis generationExtract procedures from articles to inform threat hunt planningDescriptionThis AI Actions prompt creates a threat hunt hypotheses in a tabular format that’s easy to read and integrate into reports or presentations. The hypotheses are…

AI governance workshop summary

The image projected by Viktor Mayer-Schönberger summed up the AI governance dialogue perfectly. It was a gigantic motorcycle driver barreling around a curve. The image was used to represent someone “who doesn’t know where he is going, but wants to…