Resources

Intelligence Sources,
Coverage & FAQ

Everything you need to know about the data behind AEGIS and how it works.

Data Sources

Powered by authoritative sources

AEGIS pulls from five live data feeds. Every data point in the platform is sourced and cited.

CISA KEV

Known Exploited Vulnerabilities catalog maintained by the Cybersecurity and Infrastructure Security Agency. Tracks actively exploited CVEs with remediation deadlines.

MITRE ATT&CK

The industry-standard knowledge base of adversary tactics and techniques. AEGIS maps your security tools against 170+ techniques across the Enterprise matrix.

SANS Internet Storm Center

Real-time threat monitoring and analysis from the SANS Institute. Provides current threat level assessments and emerging attack intelligence.

OSINT Feeds

Open source intelligence from leading cybersecurity publications: KrebsOnSecurity, BleepingComputer, and The Hacker News. Parsed via live RSS for sector-relevant threat news.

EPSS

Exploit Prediction Scoring System. Machine learning model that estimates the probability a CVE will be exploited in the wild within 30 days.

Sector Coverage

Nine regulated industries

Each sector gets its own threat profile, compliance calendar, and risk model.

Financial Services Healthcare Legal Life Sciences Education Retail Government Energy & Utilities Technology
FAQ

Common questions

No. AEGIS does not connect to or authenticate with your security tools. You tell us which tools you use, and we map their known capabilities against the MITRE ATT&CK framework. Your data stays where it is.

AEGIS is not a SIEM and does not ingest logs or events. It is a threat intelligence and risk posture platform that synthesizes five external feeds (CISA KEV, MITRE ATT&CK, SANS ISC, EPSS, and OSINT threat news) with your security stack and sector context to produce actionable intelligence and compliance-ready reports.

Nine regulated industries: Financial Services, Healthcare, Legal, Life Sciences, Education, Retail, Government, Energy & Utilities, and Technology. Each gets its own threat profile, compliance calendar, and risk model.

Yes. AEGIS generates branded PDF reports including executive threat briefings and vulnerability assessments with your organization's logo. Reports pull live data so they are always current.

Five live feeds: CISA Known Exploited Vulnerabilities catalog, MITRE ATT&CK framework (via STIX), SANS Internet Storm Center, EPSS exploit prediction scores from FIRST.org, and OSINT threat news from KrebsOnSecurity, BleepingComputer, and The Hacker News. Every data point is sourced and cited.

AEGIS stores your tool selections, sector configuration, and organization settings. We do not ingest, store, or process any data from your security tools, internal networks, or endpoints. All threat intelligence comes from external public sources.