top of page

Automated and affordable Threat Intelligence compliance

check

ISO27001:2022

check

DORA

check

PCI-DSS and more

BLOG POST

ISO 27001 Threat intelligence: A new control introduced in the 2022 update.

In 2022, ISO 27001 was updated to include 11 new controls, one of which is A.5.7, Threat Intelligence. Read our report on what’s changed and how Cytidel can help businesses meet the new ISO 27001:2022 requirement for threat intelligence.

COMPLIANCE EXPERTS

Made for ISO27001:2022 Threat Intelligence, DORA and PCI DSS

Cytidel was built by ISO27001 Auditors, and tailored to suit the needs of organisations looking to stay on top of Threat Intelligence compliance across ISO27001:2022, DORA and PCI DSS.

compliance_box
DATA_FEEDS

DATA COLLECTION & ANALYSIS

A single view that consolidates data from over 1000 sources.

Over 1000 vetted and analysed sources mapped against every CVE, enabling you to easily understand and contextualise the risk profile of every vulnerability.

RELEVANT ALERTS

Get tailored alerts for intelligence relevant to your organisation

Automated email alerts for new intelligence relevant to your organisation’s vulnerabilities, vendors and products

alerts
CVE_Trends

TRENDING VULNERABILITIES

Easily stay on top of trending vulnerabilities and rising threats

Quickly analyse CVEs based on real-time intelligence including:
 

  • Trending in news or social media

  • New exploit, zero-day or POC

  • Emerging threat not yet published to NVD

REMEDIATIONS

Get the latest patch details, vendor advisories and potential workarounds

Kickstart the remediation process with our CTI analyst provided remediation steps for any CVE on the Cytidel Spotlight.

remediation
Spotlight_Notes

CTI ANALYSIS

Share expert analyst notes with your team

Drive action for key vulnerabilities with a ready made report detailing why a vulnerability is on Cytidel’s Spotlight. Analysis includes:
 

  • Threat patterns & historical context

  • Associated threat actors or campaigns

  • Malware associated

  • Exploitation methods

  • Linked CVEs

VULNERABILITY PRIORITISATION

Take your management of technical vulnerabilities to the next level

Quickly prioritise CVEs based on real-time vulnerability intelligence with the bulk analyser tool. Paste in a list of CVE IDs or upload a .csv file to identify the risks that pose the greatest threat to your organistaion.

CVE_Prioritisation
an_post

"I'm enjoying a cup of tea and a break because of the speed and accuracy of your work which repeatedly keeps me ahead of the threats and the news-cycle. 

​

Time and time again Cytidel RECON speeds up my day, saves me time and in doing so saves on BUDGET and RESOURCES!"

- Threat Intelligence Manager, An Post

Join Cytidel and start reducing your breach-risk exposure today

14-day free trial, no deployment or custom implementation needed, no credit card required. 

bottom of page