
Feedly and Cyware: Rich context for faster analysis
Threat IntelligenceFeedly and Cyware: Rich context for faster analysisImprove analyst productivity and accelerate action.15-second summaryCyware’s CTIX and Orchestrate help teams analyze, collaborate, and orchestrate actions on threat intelligence data acquired from commercial and open sources. However, Cyware users need their…
Cybersecurity Data Governance Digital Trade Free Expression Online Geopolitics of IG Privacy & Surveillance
Yes, it’s a Ban – The Real Story Behind the New TikTok Law
The US Government is seeking new authorities to ban TikTok as a national security threat. If it sounds like deja vu, that’s because it is. In the year and three months since our study debunking the claims that TikTok is…
Outsmart the competition & extract actionable insights
Market IntelligenceOutsmart the competition & extract actionable insightsContinuously monitor competitors’ real-time moves & analyze their strategy with AI 15 sec-summaryNavigating a dynamic competitive landscape and staying ahead of the competition is tougher than ever. With so much information published across…
Unpacking India’s New AI Advisory
India’s government is intensifying its scrutiny of foreign tech companies ahead of national elections. A recent directive from India’s Ministry of Electronics and Information Technology (MeitY) mandates explicit government permission for deploying “under-tested” or “unreliable” AI models and software for…
TTP Dashboard: Discover trending threat actor behavior
Threat IntelligenceTTP Dashboard: Discover trending threat actor behaviorPrioritize threat hunts, prepare mitigations, and create threat actor profiles.15 Sec-summaryIdentifying new threat actor behavior is tedious and resource-intensive, requiring focused reading to tag text in articles to MITRE ATT&CK and manually extract…
Public and Private Power in Internet Content Regulation: ICANN and Registry “Voluntary” Commitments
Is censorship something that only happens when state actors do it, or can private actors engage in it as well? That crucial Internet governance debate is taking place in two venues: The U.S. Supreme Court, which will rule on two…
The Dutch in the grip of Internet nationalism
The Netherlands has a reputation for being a liberal, broad-minded place that is open to the world. Its scholars in Internet governance have emphasized the need for a globally recognized “public core” of the Internet. But apparently the virus of…
Track sustainability and climate-related regulations
Market IntelligenceTrack sustainability and climate-related regulationsStay on top of environmental policies as they are debated, adopted, and implemented.15 sec-summarySustainability and climate-related laws are rapidly evolving, with new regulations discussed and adopted daily. This can leave businesses struggling to stay ahead….
Understanding National Security in a Digital Age: Summary of IGP’s 8th Annual Workshop
On November 10, 2023, we convened a diverse group of experts at the National Academies of Sciences in Washington D.C. for our 8th Annual Workshop. Our goal? To examine the critical question: what should national security look like in a…
Monitor use cases of emerging technologies
Market IntelligenceMonitor use cases of emerging technologiesStay up to date with technological advancements and technology use cases in your industry15-second summaryTechnological processes are accelerating so fast that it’s difficult to identify tangible ways that emerging tech can be incorporated into…