Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.signalark.app/llms.txt

Use this file to discover all available pages before exploring further.

The Cyber Radar lens is designed for cybersecurity vendors, managed service providers (MSPs), and any GTM team selling into accounts based on security risk and compliance exposure. It monitors the web for signals of technical vulnerability, regulatory pressure, infrastructure risk, and security posture changes at your target accounts — and applies a rigorous Trust Scoring model to make sure what reaches your feed is verified, not noise. Cyber signals are inherently noisy. A breach rumor on a forum, an unverified tweet about a leak, a third-hand account of a ransomware event — the internet generates far more security chatter than real incidents. Cyber Radar’s Trust Scoring exists specifically to separate verified, actionable intelligence from speculation before it reaches your reps.

Signal taxonomy

The Cyber Radar lens tracks 19 signal families across five categories.
Direct or confirmed security events at target accounts:
  • data_breach — confirmed or reported unauthorized access to company data
  • ransomware_attack — ransomware deployment or extortion event
  • credential_leak — employee credentials exposed in third-party breaches or paste sites
  • dark_web_mention — company name or assets appearing on dark web forums or marketplaces

Trust Scoring model

Because cyber signals are frequently unverified, every signal in the Cyber Radar lens is evaluated against a trustComposite score before it’s classified and surfaced. The Trust Scoring model evaluates three factors: 1. Source authority Not all sources are equal. A CVE database entry, a government advisory, or a CISA bulletin carries far more weight than an anonymous forum post or a single social media claim. Signal Ark maintains a tiered source authority registry that weights each source type automatically. 2. Extraction certainty How confident is Signal Ark’s extraction model that the event described in the source actually occurred at the target account — not at a similarly-named company, not hypothetically, and not as a prediction? Low extraction certainty signals are flagged and down-ranked. 3. Corroboration Has this event been independently reported across multiple sources? A breach that appears in one news article scores lower than a breach confirmed by the affected company’s official disclosure, two independent news sources, and a CVE entry. Cross-source corroboration is the strongest trust signal.

Confidence tiers and alert eligibility

Every cyber signal is assigned to a confidence tier based on its trustComposite score. The tier determines what the signal is allowed to do in Signal Ark.
TierDescriptionAlert eligibleCRM push eligible
Tier 1 — VerifiedHigh authority, highly corroboratedYesYes
Tier 2 — ProbableModerate authority, limited corroborationPushed for human reviewWith manual approval
Tier 3 — UnverifiedLow authority or single-sourceNoNo
A cyber signal must be Tier 1 or manually reviewed and approved by a human before it can be pushed to HubSpot or Salesforce. Tier 3 signals are suppressed from rep-facing alerts entirely and are retained only as background context for compounding score calculations. This prevents your CRM from being polluted with unverified breach rumors.

Using Cyber Radar effectively

1

Switch to the Cyber Radar lens

Use the lens selector in the top navigation to switch to Cyber Radar. Your Market Radar Feed updates to show only cyber-classified signals, scored using the Trust Scoring model rather than the standard 5-dimension model.
2

Filter by Tier 1 signals

Start with Tier 1 — Verified signals. These are the events you can act on immediately. Reach out to the affected account with a relevant, evidence-backed angle — a compliance failure, a recent breach in their sector, or an EOL system in their stack.
3

Review Tier 2 signals

Tier 2 signals are pushed to your feed for human review. Read the evidence and source information, and make a judgment call: if you’re confident the signal is real, you can manually approve it for CRM push and outreach.
4

Generate a Cyber Risk Account Brief

For accounts showing multiple cyber signals, generate a Cyber Risk Account Activation Brief. This brief synthesizes the account’s full security posture — breach exposure, compliance deadlines, vulnerable tech — into a structured, safe-to-send document for your reps.
The Compliance & Security Urgency GTME Play draws on Cyber Radar signals. When an account shows a looming compliance deadline combined with peer breaches or an active audit signal, the GTME engine may activate a play automatically. Check the GTME Plays feed for accounts showing elevated Cyber Radar activity.