IGF Mauritius

Internet Governance Forum Mauritius

threat intelligence

Track adversary behavior in real-time with Threat Actor Insights Cards

Threat IntelligenceTrack adversary behavior in real-time with Threat Actor Insights Cards Accelerate threat actor profiling15 sec-summaryUnderstanding your adversaries’ tactics, techniques, and procedures is fundamental to securing your attack surface. Your threat actor profiles should reflect recent and historical activity, target…

Fundamentals

Deep-dive: Optimizing prompts for AI Actions

FundamentalsDeep-dive: Optimizing prompts for AI ActionsPractical examples to generate desired responsesThis guide demonstrates the process of optimizing a prompt for AI Actions feature. By following this real-world example, you’ll learn how to craft effective prompts to extract valuable insights from…

Fundamentals

Hands-on guide to optimizing prompts for AI Actions

FundamentalsHands-on guide to optimizing prompts for AI ActionsUnlocking the full potential of AI Actions through effective prompt engineeringAI Actions is designed to extract valuable insights from articles quickly and efficiently. Crafting effective prompts is the key to getting the most…

threat intelligence

AI Actions help threat hunters plan effective hunts

Threat Intelligence AI Actions help threat hunters plan effective huntsExtract insights and transform OSINT into intelligence with source citations15-sec summaryAI Actions helps teams transform multiple articles into actionable output by extracting insights or generating custom reports and executive summaries. In…

threat intelligence

Generate vulnerability intelligence reports in minutes with AI Actions

Threat IntelligenceGenerate vulnerability intelligence reports in minutes with AI Actions Synthesize and analyze vulnerabilities to extract data and triage risks faster 15 sec-summaryWe previously discussed how AI Actions can synthesize multiple articles to extract insights and create customized intelligence reports…

threat intelligence

Turn open-source articles into actionable threat intelligence reports

Threat IntelligenceTurn open-source articles into actionable threat intelligence reportsAI Actions synthesize cybersecurity content and create customizable, trustworthy threat intel reports15-second summaryAnalyzing a threat actor’s campaign or deconstructing a cyberattack can take hours, as it involves digesting articles, extracting patterns, and…

Market Intelligence market-intel-enterprise-only Star feature

Track the impact of Gen AI in your industry

Market IntelligenceTrack the impact of Gen AI in your industryFind Generative AI insights, metrics, and use cases faster using Feedly AI15 sec-summaryThe hype around ‘AI’ reached new heights, earning the title of the most notable word of the year in…

IG Institutions

The Disappointing NETMundial+10

The NETMundial 10th anniversary event was held April 23 and 24 in Sao Paulo, Brazil. As we wrote earlier, “Netmundial was a transformative moment in global internet governance. Inspired by the Snowden revelations, and amplified by the U.S. government’s announcement that it…

cybersecurity-only Star feature threat intelligence

Get a 360° view of malware and ransomware in minutes with Malware Insights Cards

Threat IntelligenceGet a 360° view of malware and ransomware in minutes with Malware Insights CardsJumpstart analysis with summaries, trends, threat actor links, CVEs, TTPs, and reports.15 sec-summaryUnderstanding malware can be exhausting, requiring research, code analysis, behavioral analysis, and more. Getting…

The Traditional Media’s Role in Sculpting Truth: the Originator Profile and Unfair Election Reports

As the global community grapples with various regulatory frameworks and policy recommendations put forward by states, social media companies, and academia, the pivotal role of traditional media and journalists often slips under the radar. The article discusses information integrity efforts…