Discover Trends in Cybersecurity
We surface rapidly growing trends in Cybersecurity before they take off.
Data Privacy Tools
Data privacy tools are software and services that help organizations protect personal data, manage user consent, enforce data minimizatio...
Cyera
Cyera is a cybersecurity company specializing in cloud data security and data governance, focusing on discovering, classifying, and secur...
Voice Phishing
Voice Phishing (vishing) is the deceptive practice of using telephone calls to trick individuals into divulging sensitive information or ...
Post Quantum Cryptography
Cybersecurity Awareness Training
Cybersecurity Awareness Training is a and established practice focusing on educating users and employees to recognize phishing, social en...
Svix
Svix is a company that provides a scalable webhook infrastructure platform to manage, deliver, and monitor webhooks for applications and ...
Security Posture Management
Security Posture Management (SPM) is a cybersecurity discipline and product category that continuously assesses, visualizes, and improves...
Managed Detection and Response
Managed Detection and Response (MDR) is a cybersecurity service that combines threat monitoring, detection, and response automation with ...
Zero Networks
Zero Networks is a company focusing on zero trust networking and secure remote access, reflecting broader enterprise adoption of zero tru...
Privacy Engineering
Privacy Engineering is a discipline focused on embedding privacy by design into systems, products, and data pipelines through governance,...
Military Cybersecurity
Military cybersecurity refers to the defense sector's efforts to protect national defense networks, weapons systems, and critical infrast...
NinjaOne
NinjaOne is an established IT management platform focused on remote monitoring and management (RMM), endpoint security, and IT operations...
Cloud Security Management
Cloud Security Management is the discipline of governing, monitoring, and enforcing security across multi cloud and hybrid environments u...
Cato Networks
Cato Networks is a cybersecurity company specializing in Secure Access Service Edge (SASE) and cloud native secure connectivity, widely d...
Tailscale
Tailscale is a, established company that provides a zero trun VPN mesh networking platform built on WireGuard, enabling secure, private n...
Cnapp
CNAPP (Cloud Native Application Protection Platform) is a, established category that consolidates cloud native security capabilities acro...
One-Time Password
One Time Password (OTP) is a two factor authentication method that generates a temporary numeric or alphanumeric code for user verificati...
Passkey
Passkey refers to passwordless authentication standards (FIDO2/WebAuthn) that enable sign in using cryptographic keys on devices, improvi...
Allowlist
Allowlist has emerged as a security and access control concept where only explicitly approved entities (users, IPs, devices, apps) are gr...
PreVeil
PreVeil is a company delivering enterprise grade, end to end encrypted email and data protection for cloud environments, gaining attentio...
Keyfactor
Keyfactor is a leading provider of certificate based identity, PKI and cryptographic management solutions used to automate and secure dig...
SecOps
Security Operations (SecOps) is the discipline of continuously monitoring, detecting, and responding to cybersecurity incidents across an...
Trivy
Trivy is a widely used open source vulnerability scanner for container images, filesystem, and repository contents, developed by Aqua Sec...
Cybersecurity Technology
Cybersecurity technology encompasses tools, platforms, and practices designed to detect, prevent, respond to, and recover from cyber thre...
Vaultwarden
Vaultwarden is a self hosted, community driven alternative to Bitwarden designed for running a private password manager server on persona...
Canary Technologies
Canary Technologies is a company specializing in cloud based access control and guest experience solutions for hospitality and property m...
Wazuh
Wazuh is an open source security monitoring and SIEM platform that aggregates and analyzes security events from endpoints, servers, and c...
Stytch
Stytch is a company offering passwordless authentication and identity APIs, driving a shift in developers adopting frictionless login exp...
Veriff
Veriff is a time identity verification platform that uses AI powered checks to confirm user identities online, widely adopted across fint...
Upguard
UpGuard is a cybersecurity company specializing in risk management, vendor risk, and cyber exposure monitoring to help organizations iden...
Avanan
Avanan is a cybersecurity company specializing in cloud email security, providing AI driven phishing and malware protection and integrati...
Proton VPN
Proton VPN is a, established privacy focused virtual private network service developed by Proton AG, known for its emphasis on security, ...
Cybersecurity Training
Cybersecurity training is a, established field focused on educating individuals and organizations to prevent, detect, and respond to cybe...
Vanta
Vanta is a leading security and compliance automation platform that helps companies achieve and maintain standards like SOC 2 and ISO 270...
Drata
Drata is a company offering automated continuous security and compliance orchestration, widely adopted to streamline SOC 2, ISO 27001, an...
Data Privacy
Data privacy is the ongoing emphasis on protecting personal information, governing data collection, usage, storage, and consent across di...
Credential Stuffing
Credential stuffing is a cyberattack technique that automates login attempts using lists of compromised credentials to gain unauthorized ...
OPNsense
OPNsense is a, active open source firewall and routing platform based on HardenedBSD, known as a fork of pfSense. It is developed and dis...
Flock Safety
Flock Safety is a company that builds automated license plate reader (ALPR) camera networks used by communities and law enforcement for p...
Cloudflare
Cloudflare is a, established company providing edge networking, security, content delivery, and related services that optimize and protec...
Managed Security Services
Managed Security Services is a and established market where third party providers deliver ongoing security monitoring, threat detection, ...
OT Security
OT Security refers to protecting operational technology environments, including industrial control systems, SCADA, and process automation...
Passwordless Authentication
Passwordless authentication is a, established trend in digital security that eliminates the need for traditional passwords by leveraging ...
Blocksi
Blocksi is a company offering classroom management and web filtering solutions for schools, universities, and organizations, focusing on ...
DNSFilter
DNSFilter is a cybersecurity company specializing in DNS based content and threat filtering to protect networks from malware, phishing, a...
Security as a Service
Security as a Service (SECaaS) is a cloud delivered model where security capabilities such as identity, threat detection, firewalling, SI...
ZTNA
ZTNA (Zero Trust Network Access) is a security paradigm and enterprise networking approach that grants least privilege access to applicat...
Abnormal Security
Abnormal Security is a cybersecurity company focused on AI driven email security to prevent phishing, business email compromise, and othe...
Passwordless
Passwordless authentication is a security and usability trend where users sign in without passwords, using methods such as hardware keys,...
Cyberattack
Cyberattack refers to deliberate unauthorized access, disruption, or manipulation of computers, networks, or data, typically conducted by...
Data Exfiltration
Data exfiltration is the unauthorized transfer of data from an organization to an external destination, often driven by cybercrime, insid...
Cybersecurity
Cybersecurity is a mature, ongoing global trend focused on protecting digital assets, networks, and users from increasingly sophisticated...
Multi-Factor Authentication
Multi Factor Authentication (MFA) is a security approach requiring two or more independent credentials to verify a user’s identity, str...
Fraud Detection
Fraud Detection is a mature field focused on identifying and preventing fraudulent activities across financial services, e commerce, and ...
BigID
BigID is a data privacy and security company that provides data discovery, classification, and protection solutions using AI to help ente...
Threat Intelligence
Threat intelligence is the practice of collecting, analyzing, and disseminating information about cyber threats to inform defense decisio...
Cybersecurity Jobs
Cybersecurity jobs encompass roles focused on protecting systems, networks, and data from cyber threats; demand is driven by increasing c...
Legit Security
Legit Security is a cybersecurity company specializing in software supply chain security and application security posture management. The...
Cybersecurity Certification
Cybersecurity Certification is a trend around formal credentialing for cybersecurity skills, driven by the need for validated expertise i...
Menlo Security
Menlo Security is a cybersecurity company specializing in browser isolation and secure web gateway solutions designed to render web conte...