Author: tech-tutorials

The InsightOS architecture | Feedly

Introduction: Transitioning from ad-hoc research to a systematic InsightOS In Part 1, we established why organizations need an InsightOS—a systematic approach to intelligence for modern business environments. Now we will explore how to build one, outlining an architecture that transforms theoretical need into practical capability. This architecture isn’t just another […]

Feedly MCP Server: Automate CTI workflows with Claude and the Feedly Threat Graph

AI tools create dangerous blind spots for security teams. Without real-time threat context, they’re limited to outdated knowledge and partial responses that can miss critical emerging threats. With Feedly’s Threat Graph MCP Server, you can: Give your AI tools the context they need. Connect them directly to Feedly’s Real-time Threat […]

Webinar – Adversarial prompts: Open-source tools that detect, hunt, and block IoPCs

Generative AI is now embedded in business workflows, along with malicious prompts. Adversarial prompts, or Indicators of Prompt Compromise (IoPCs), reveal attempts to exploit, abuse, or manipulate AI models for malicious purposes. Join Thomas Roccia, threat researcher, author, and speaker, to explore how security teams can detect and defend against […]