Cyber security is a game of foresight. It is a chessboard on which attackers and defenders are constantly looking for checkmate.
Launch of the hackers a new ransomware attack every 14 seconds. They are increasingly capable and sophisticated. Learning how they plan attacks, what techniques they use, and who they target can make you much more prepared. You will also save the cost and headache of a cyber attack. This is particularly important considering that the cost of ransomware attacks in the United States alone exceeded $ 7.5 billion in 2019.
But investigating malware threats is boring. Hundreds of new articles and tweets need to be reviewed and evaluated every day. Finding critical threats in that sea of information is time-consuming and overwhelming.
We want to help you optimize your tactical and operational open source intelligence so you can better protect your environment.
That’s why we taught Leo, yours AI research assistant, to recognize malware threats. You can ask them to read your security feeds and prioritize what’s relevant to you, your industry, and your environment.
Imagine you are working on a threat intelligence team and are responsible for researching and analyzing the threat landscape. You are particularly interested in the evolution of malware threats (including ransomware and malvertisement).
Cut the noise
You can train Leo to read your security news feed and prioritize malware-related articles.
Leo continually reads the thousands of articles posted in those feeds. It’s an efficient way to cut through the noise and keep up with the evolving malware landscape without the overwhelm.
You are in control
Leo has been trained to understand broad topics such as malware as well as hundreds of specific malware types such as malvertisement, ransomware, adware, bots, rootkits, spyware, etc.
Asking Leo to prioritize malware in your security news feed is as simple as creating a new topic priority and selecting “malware” as the topic.
you can combine arguments with + AND and + OR and create even more focused priorities for Leo. For example, use + AND to focus on malware related to Android or the best companies in your industry.
You can also ask Leo to look for a specific type of malware such as malvertisement or ransomware.
Continuously learn and become smarter
Leo is smart. Learn continuously from your feedback. When Leo gets it wrong, you can use the “Less like this” down arrow button to let him know that an article he has prioritized is not about malware.
Break down the silos
Bring your research team into the photo. They can create an Intel Threat Report Board and save the most critical information they discover in their Feedly. So everyone with the same advice can leave notes and highlight the major threats.
We have seen teams create tactical and operational cards. For example, a vulnerability report can be created with information for those involved in security procedures, while CISO strategic newsletters can keep management up to date with malware and planned response.
Bookmarked articles on a board can be shared with the rest of the team via daily newsletters, Slack and Microsoft Teams notifications, or sent to other apps using the Feedly API for cybersecurity.
Simplify your open source intelligence
We are excited to see how your security team will shrink your feeds and further analyze the critical threats that matter to you. Sign up today and find out Feedly for cyber security.