Liberty91
A working CTI function — without building one

Know What Matters Before It Matters.

Get the output of a mature CTI function on day one — real intelligence mapped to your assets and suppliers, with IOCs, detection rules, and remediation. No 6-figure analyst hires. No 12-month programme build. No waiting days for answers.

Start Free Trial

The Challenge.

Running cyber threat intelligence as a capability is a full lifecycle: defining the questions that matter, collecting across hundreds of sources, processing and analysing every event against your organisation, disseminating the result to the right stakeholders, and feeding back what landed.

Most organisations cannot staff all of that. So they read security news hours after publication, use it for loose ‘situational awareness’, and stop short of the actions the intelligence should produce. Leaders feel reactive and fear they could miss something critical at any point.

What they actually need is a working CTI capability — one that turns every relevant event into a report, an IOC list, a detection rule, and a remediation step. Without hiring a team to build it.

How Liberty91 Helps.

01

Define once: your Intelligence Requirements

You (or we, together) define the questions your organisation needs answered. Threats to your tech stack. Threats from named actors. Organisation-specific concerns like VIP exposure or an upcoming M&A. These become the configurable spine of your agent stack.

Learn how Intelligence Requirements work
02

Agents run the grind 24/7

Self-updating knowledge bases per requirement. Agents collaborate to interpret every new event against your profile — the technologies you deploy and the suppliers you depend on. Collection, filtering, correlation, IOC extraction, detection rule generation — all handled.

03

You get answers, not a reading list

Board-ready briefs, RFI responses in minutes, Sigma rules straight to your SIEM, and remediation steps — each mapped to your requirements. Your analysts, if you have them, do analysis. The platform does everything else.

Not a Chatbot. A Full Intelligence Function.

Generic LLMs answer prompts. Liberty91 runs the threat intelligence lifecycle — Direction, Collection, Processing, Analysis, Dissemination, Feedback — continuously, without a team to run it.

It is a self-updating agent stack, not one-shot chats. Every new event is evaluated against your Intelligence Requirements and the rest of your profile as it happens. Collection across hundreds of sources, IOC extraction, correlation, and templated reporting — the grind — is delegated to agents.

Your analysts, if you have any, are freed to do the 20% only humans can do: strategic assessment, stakeholder conversations, hypothesis-led investigation.

Real-Time Dashboard.

https://platform.liberty91.com
Liberty91 threat intelligence dashboard with real-time streaming events

Daily Morning Report.

L91

Liberty91 Morning Report

to: security-team@acme.com

Daily Cybersecurity Morning Report — April 2, 2026

Tailored Threat Intelligence Report

Executive Summary

Critical cybersecurity threats including actively exploited Google Chrome vulnerabilities, regional scams targeting travelers and grieving families in the UK, and a complex web of data breaches and phishing campaigns impacting major technology companies.

Attack Surface Threats

Google Chrome — CVE-2026-5281

Actively exploited zero-day, CVSS 8.8. Patch by April 15.

EvilTokens Phishing-as-a-Service

New kit targeting Microsoft accounts via device code phishing.

SLSH / Scattered Spider Data Exfiltration

3M+ Salesforce records from major U.S. tech company.

Regional: United Kingdom

Reservation hijack scams targeting travelers via compromised booking systems.

View Full Report in Platform

3%

Only 3% of security leaders can say, with evidence, how any given threat impacts their organisation. The other 97% don't need more dashboards — they need the capability that produces the answer. Liberty91 is that capability.

Why Security Leaders Choose Liberty91.

Fastest, easiest collection

Hundreds of sources (open, closed, dark web, vendor feeds), 24/7, filtered against your Intelligence Requirements on the way in. No feed-tuning project, no analyst triage queue.

Fastest, easiest analysis

Every event is contextualised against your tech stack, suppliers, VIPs, and requirements by collaborating agents. Correlation and enrichment happen automatically; humans are invited only where judgment is needed.

Fastest, easiest production

Different stakeholders need different outputs. Board-ready briefs, SOC-ready Sigma and IOCs, exec summaries, customer-tailored reports — generated on demand, for the audience you pick.

A CTI function without the team

All of the above is what a mature 5-person CTI team produces. Without the hiring, the 12-month build, or the six-figure annual spend.

Frequently Asked Questions.

Ready to do more with less?

Request a demo or start your free trial today. Get instant access to AI-powered threat intelligence tailored to your organisation.