By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
DaltonitDaltonitDaltonit
Search
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: The new Cybersecurity Trending Dashboard – Feedly Blog daltonit
Share
Sign In
Notification Show More
Font ResizerAa
DaltonitDaltonit
Font ResizerAa
Search
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
SCIENCEEnglish

The new Cybersecurity Trending Dashboard – Feedly Blog daltonit

Dalton
Last updated: 3:47 pm
Dalton
Share
5 Min Read
SHARE

The new Cybersecurity Trending Dashboard

Keeping up with the most critical threats, vulnerabilities, and threat actors can be time consuming and overwhelming.

We have been working with some existing Feedly for Cybersecurity customers to create a trending dashboard that offers an at-a-glance overview of the evolving cybersecurity threat landscape.

The Cybersecurity Dashboard is now available for all Feedly for Cybersecurity customers.

Here’s a quick walkthrough of what you can find on the Cybersecurity Dashboard.

Trending threats

The first component of the Trending Dashboard is a list of the trending threats reported across 1,200 different cybersecurity sources (news sites, blogs, or Twitter accounts).

You can find the Cybersecurity Dashboard in your left navigation bar, in the “Dashboards” section.

The Cybersecurity Dashboard allows you to get a quick overview of what are the critical threats that are being reported across all the cybersecurity sites the Feedly community is reading. Think of it like a TechMeme for Cybersecurity.

The model producing this dashboard is focusing on the news published in the last 24 hours.

Behind the scenes, Feedly AI reads all the articles across all the cybersecurity sources and Twitter accounts. Leo dismisses articles that are not about cybersecurity threats, clusters the ones that are reporting the same threat, and ranks them using different “features”.

The initial model we are pushing to beta is a global model. This means that your personal priorities and mute filters are not affecting this model (yet!).

Trending vulnerabilities

The second component of the Cybersecurity Dashboard is a list of the trending vulnerabilities that are being discovered or discussed across cybersecurity sources.

You can click on a specific vulnerability and drill down to a page that captures all the mentions and chatter around that vulnerability.

Click on any of the trending vulnerabilities and view a CVE Insights Card with the chatter about a specific vulnerability

Trending threat actors

The last component is a list of trending threat actor mentions. It allows you to get an overview of which threat actors are being covered in the news.

You can click on a specific threat actor and get a “Search across the Web” overview of the mentions.

Click on any threat actor in the Dashboard to see the chatter about that specific threat actor

Continuously learning and getting smarter

Every component has a “Less Like This” down arrow button that you can use to provide feedback to Feedly AI. The feedback is going to be reviewed by the product team during the beta to understand how to improve the relevance, deduplication, and prioritization. Feedly AI loves candid feedback.

Use the Less ‘Like This’ button to offer Feedly AI feedback

We look forward to listening to your feedback and continuously improving the Cybersecurity Dashboard.

We also want to thank the customers who suggested this feature and worked with us during the Alpha. You know who you are!

Can I personalize the Cybersecurity Dashboard?

Not in the current version. Once we have the core model optimized, we will look at ways to allow you personalize the dashboard by industry, product, threat types.

What is the best way to offer feedback to the product team during the beta?

If you have feedback regarding specific articles or CVEs, please use the’ Less Like This’ button to submit your feedback. If you have ideas on how to improve the AI Model, please email enterprise@feedly.com.

How can I get a demo of Feedly for Cybersecurity?

If you are part of a cybersecurity team and want to get a demo of how Feedly for Cybersecurity can help you streamline your open-source intelligence, you can request a demo and a free trial here.

Can I access the Cybersecurity Trending Dashboard in the Feedly mobile app?

Not yet. The beta is only available in the Feedly Web application. We will integrate this feature into the mobile experience once the beta is complete.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Five industry newsletters the Feedly community loves to read – Feedly Blog daltonit
Next Article Feedly AI learns from the community – Feedly Blog daltonit
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • SUI crypto surges over 30% as meme coins gain traction daltonit
  • Aptos Foundation invests in Universal Health Token to advance decentralized healthcare daltonit
  • Prompt engineering: conduct a Diamond Model of Intrusion Analysis daltonit
  • US court permits Three Arrows Capital to expand claim against FTX, rejects FTX’s objections daltonit
  • VanEck research reveals if Strategic Bitcoin Reserve can pay off US debt by 2049 daltonit

Recent Comments

  • Connor on Here’s Why Business Needs a Mobile-Friendly Website
  • Connor on Here’s Why Business Needs a Mobile-Friendly Website
  • Connor on Here’s Why Business Needs a Mobile-Friendly Website

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • SUI crypto surges over 30% as meme coins gain traction daltonit
  • Aptos Foundation invests in Universal Health Token to advance decentralized healthcare daltonit
  • Prompt engineering: conduct a Diamond Model of Intrusion Analysis daltonit
  • US court permits Three Arrows Capital to expand claim against FTX, rejects FTX’s objections daltonit
  • VanEck research reveals if Strategic Bitcoin Reserve can pay off US debt by 2049 daltonit

Search

Follow US
Daltonit. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Not a member? Sign Up