The Cyber Radar lens is designed for cybersecurity vendors, managed service providers (MSPs), and any GTM team selling into accounts based on security risk and compliance exposure. It monitors the web for signals of technical vulnerability, regulatory pressure, infrastructure risk, and security posture changes at your target accounts — and applies a rigorous Trust Scoring model to make sure what reaches your feed is verified, not noise. Cyber signals are inherently noisy. A breach rumor on a forum, an unverified tweet about a leak, a third-hand account of a ransomware event — the internet generates far more security chatter than real incidents. Cyber Radar’s Trust Scoring exists specifically to separate verified, actionable intelligence from speculation before it reaches your reps.Documentation Index
Fetch the complete documentation index at: https://docs.signalark.app/llms.txt
Use this file to discover all available pages before exploring further.
Signal taxonomy
The Cyber Radar lens tracks 19 signal families across five categories.- Incident & Exposure
- Compliance & Regulatory
- Tech Stack & Infrastructure
- Expansion & Footprint
- Market Pressure
Direct or confirmed security events at target accounts:
data_breach— confirmed or reported unauthorized access to company dataransomware_attack— ransomware deployment or extortion eventcredential_leak— employee credentials exposed in third-party breaches or paste sitesdark_web_mention— company name or assets appearing on dark web forums or marketplaces
Trust Scoring model
Because cyber signals are frequently unverified, every signal in the Cyber Radar lens is evaluated against atrustComposite score before it’s classified and surfaced. The Trust Scoring model evaluates three factors:
1. Source authority
Not all sources are equal. A CVE database entry, a government advisory, or a CISA bulletin carries far more weight than an anonymous forum post or a single social media claim. Signal Ark maintains a tiered source authority registry that weights each source type automatically.
2. Extraction certainty
How confident is Signal Ark’s extraction model that the event described in the source actually occurred at the target account — not at a similarly-named company, not hypothetically, and not as a prediction? Low extraction certainty signals are flagged and down-ranked.
3. Corroboration
Has this event been independently reported across multiple sources? A breach that appears in one news article scores lower than a breach confirmed by the affected company’s official disclosure, two independent news sources, and a CVE entry. Cross-source corroboration is the strongest trust signal.
Confidence tiers and alert eligibility
Every cyber signal is assigned to a confidence tier based on itstrustComposite score. The tier determines what the signal is allowed to do in Signal Ark.
| Tier | Description | Alert eligible | CRM push eligible |
|---|---|---|---|
| Tier 1 — Verified | High authority, highly corroborated | Yes | Yes |
| Tier 2 — Probable | Moderate authority, limited corroboration | Pushed for human review | With manual approval |
| Tier 3 — Unverified | Low authority or single-source | No | No |
Using Cyber Radar effectively
Switch to the Cyber Radar lens
Use the lens selector in the top navigation to switch to Cyber Radar. Your Market Radar Feed updates to show only cyber-classified signals, scored using the Trust Scoring model rather than the standard 5-dimension model.
Filter by Tier 1 signals
Start with Tier 1 — Verified signals. These are the events you can act on immediately. Reach out to the affected account with a relevant, evidence-backed angle — a compliance failure, a recent breach in their sector, or an EOL system in their stack.
Review Tier 2 signals
Tier 2 signals are pushed to your feed for human review. Read the evidence and source information, and make a judgment call: if you’re confident the signal is real, you can manually approve it for CRM push and outreach.
Generate a Cyber Risk Account Brief
For accounts showing multiple cyber signals, generate a Cyber Risk Account Activation Brief. This brief synthesizes the account’s full security posture — breach exposure, compliance deadlines, vulnerable tech — into a structured, safe-to-send document for your reps.