Discover Trends in Cybersecurity
We surface rapidly growing trends in Cybersecurity before they take off.
Data Privacy Tools
Data privacy tools are software and services that help organizations protect personal data, manage user consent, enforce data minimizatio...
Cyera
Cyera is a cybersecurity company specializing in cloud data security and data governance, focusing on discovering, classifying, and secur...
Voice Phishing
Voice Phishing (vishing) is the deceptive practice of using telephone calls to trick individuals into divulging sensitive information or ...
Post Quantum Cryptography
Cybersecurity Awareness Training
Cybersecurity Awareness Training is a and established practice focusing on educating users and employees to recognize phishing, social en...
Svix
Svix is a company that provides a scalable webhook infrastructure platform to manage, deliver, and monitor webhooks for applications and ...
Security Posture Management
Security Posture Management (SPM) is a cybersecurity discipline and product category that continuously assesses, visualizes, and improves...
Managed Detection and Response
Managed Detection and Response (MDR) is a cybersecurity service that combines threat monitoring, detection, and response automation with ...
Zero Networks
Zero Networks is a company focusing on zero trust networking and secure remote access, reflecting broader enterprise adoption of zero tru...
Privacy Engineering
Privacy Engineering is a discipline focused on embedding privacy by design into systems, products, and data pipelines through governance,...
Military Cybersecurity
Military cybersecurity refers to the defense sector's efforts to protect national defense networks, weapons systems, and critical infrast...
NinjaOne
NinjaOne is an established IT management platform focused on remote monitoring and management (RMM), endpoint security, and IT operations...
Cloud Security Management
Cloud Security Management is the discipline of governing, monitoring, and enforcing security across multi cloud and hybrid environments u...
Cato Networks
Cato Networks is a cybersecurity company specializing in Secure Access Service Edge (SASE) and cloud native secure connectivity, widely d...
Tailscale
Tailscale is a, established company that provides a zero trun VPN mesh networking platform built on WireGuard, enabling secure, private n...
Cnapp
CNAPP (Cloud Native Application Protection Platform) is a, established category that consolidates cloud native security capabilities acro...
One-Time Password
One Time Password (OTP) is a two factor authentication method that generates a temporary numeric or alphanumeric code for user verificati...
Passkey
Passkey refers to passwordless authentication standards (FIDO2/WebAuthn) that enable sign in using cryptographic keys on devices, improvi...
Allowlist
Allowlist has emerged as a security and access control concept where only explicitly approved entities (users, IPs, devices, apps) are gr...
PreVeil
PreVeil is a company delivering enterprise grade, end to end encrypted email and data protection for cloud environments, gaining attentio...
Keyfactor
Keyfactor is a leading provider of certificate based identity, PKI and cryptographic management solutions used to automate and secure dig...
SecOps
Security Operations (SecOps) is the discipline of continuously monitoring, detecting, and responding to cybersecurity incidents across an...
Trivy
Trivy is a widely used open source vulnerability scanner for container images, filesystem, and repository contents, developed by Aqua Sec...
Cybersecurity Technology
Cybersecurity technology encompasses tools, platforms, and practices designed to detect, prevent, respond to, and recover from cyber thre...
Vaultwarden
Vaultwarden is a self hosted, community driven alternative to Bitwarden designed for running a private password manager server on persona...
Canary Technologies
Canary Technologies is a company specializing in cloud based access control and guest experience solutions for hospitality and property m...
Wazuh
Wazuh is an open source security monitoring and SIEM platform that aggregates and analyzes security events from endpoints, servers, and c...
Stytch
Stytch is a company offering passwordless authentication and identity APIs, driving a shift in developers adopting frictionless login exp...
Veriff
Veriff is a time identity verification platform that uses AI powered checks to confirm user identities online, widely adopted across fint...
Upguard
UpGuard is a cybersecurity company specializing in risk management, vendor risk, and cyber exposure monitoring to help organizations iden...
Avanan
Avanan is a cybersecurity company specializing in cloud email security, providing AI driven phishing and malware protection and integrati...
Proton VPN
Proton VPN is a, established privacy focused virtual private network service developed by Proton AG, known for its emphasis on security, ...
Cybersecurity Training
Cybersecurity training is a, established field focused on educating individuals and organizations to prevent, detect, and respond to cybe...
Vanta
Vanta is a leading security and compliance automation platform that helps companies achieve and maintain standards like SOC 2 and ISO 270...
Drata
Drata is a company offering automated continuous security and compliance orchestration, widely adopted to streamline SOC 2, ISO 27001, an...
Data Privacy
Data privacy is the ongoing emphasis on protecting personal information, governing data collection, usage, storage, and consent across di...
Credential Stuffing
Credential stuffing is a cyberattack technique that automates login attempts using lists of compromised credentials to gain unauthorized ...
OPNsense
OPNsense is a, active open source firewall and routing platform based on HardenedBSD, known as a fork of pfSense. It is developed and dis...
Flock Safety
Flock Safety is a company that builds automated license plate reader (ALPR) camera networks used by communities and law enforcement for p...
Cloudflare
Cloudflare is a, established company providing edge networking, security, content delivery, and related services that optimize and protec...
Managed Security Services
Managed Security Services is a and established market where third party providers deliver ongoing security monitoring, threat detection, ...
OT Security
OT Security refers to protecting operational technology environments, including industrial control systems, SCADA, and process automation...
Passwordless Authentication
Passwordless authentication is a, established trend in digital security that eliminates the need for traditional passwords by leveraging ...
Blocksi
Blocksi is a company offering classroom management and web filtering solutions for schools, universities, and organizations, focusing on ...
DNSFilter
DNSFilter is a cybersecurity company specializing in DNS based content and threat filtering to protect networks from malware, phishing, a...
Security as a Service
Security as a Service (SECaaS) is a cloud delivered model where security capabilities such as identity, threat detection, firewalling, SI...
ZTNA
ZTNA (Zero Trust Network Access) is a security paradigm and enterprise networking approach that grants least privilege access to applicat...
Abnormal Security
Abnormal Security is a cybersecurity company focused on AI driven email security to prevent phishing, business email compromise, and othe...
Passwordless
Passwordless authentication is a security and usability trend where users sign in without passwords, using methods such as hardware keys,...
Cyberattack
Cyberattack refers to deliberate unauthorized access, disruption, or manipulation of computers, networks, or data, typically conducted by...
Data Exfiltration
Data exfiltration is the unauthorized transfer of data from an organization to an external destination, often driven by cybercrime, insid...
Cybersecurity
Cybersecurity is a mature, ongoing global trend focused on protecting digital assets, networks, and users from increasingly sophisticated...
Multi-Factor Authentication
Multi Factor Authentication (MFA) is a security approach requiring two or more independent credentials to verify a user’s identity, str...
Fraud Detection
Fraud Detection is a mature field focused on identifying and preventing fraudulent activities across financial services, e commerce, and ...
BigID
BigID is a data privacy and security company that provides data discovery, classification, and protection solutions using AI to help ente...
Threat Intelligence
Threat intelligence is the practice of collecting, analyzing, and disseminating information about cyber threats to inform defense decisio...
Cybersecurity Jobs
Cybersecurity jobs encompass roles focused on protecting systems, networks, and data from cyber threats; demand is driven by increasing c...
Legit Security
Legit Security is a cybersecurity company specializing in software supply chain security and application security posture management. The...
Cybersecurity Certification
Cybersecurity Certification is a trend around formal credentialing for cybersecurity skills, driven by the need for validated expertise i...
Menlo Security
Menlo Security is a cybersecurity company specializing in browser isolation and secure web gateway solutions designed to render web conte...
Zero Trust
Zero Trust is a cybersecurity framework and philosophy that requires verification of every user and device, irrespective of location, and...
NordPass
NordPass is a password management solution developed by Nord Security, part of the broader family of cybersecurity and digital privacy to...
Fortinac
FortiNAC is Fortinet’s network access control (NAC) solution that manages device authentication, policy enforcement, and segmentation t...
Cyber Insurance
Cyber insurance is a mature and evolving insurance segment that covers losses from cyber threats such as data breaches, ransomware, and b...
Netskope
Netskope is a company specializing in cloud security, data protection, and secure access service edge (SASE) solutions, reflecting a broa...
IT Security Specialist
The trend centers on the rising demand for IT security specialists as cyber threats intensify, driving organizations to hire, upskill, an...
MFA Authenticator
MFA Authenticator refers to mobile apps and software used for multi factor authentication, such as Google Authenticator, Microsoft Authen...
SheerID
SheerID is a identity verification company that enables brands to confirm consumer eligibility for discounts, seniority, student status, ...
HackerOne
HackerOne is a, established platform that operates a global bug bounty and vulnerability disclosure program ecosystem, connecting securit...
Claroty
Claroty is a leading cybersecurity company specializing in Operational Technology (OT) and Industrial Control Systems (ICS) security, foc...
Recorded Future
Recorded Future is a time threat intelligence platform that aggregates and analyzes data from open, dark, and technical sources to identi...
Homomorphic Encryption
Homomorphic encryption enables computation on encrypted data without decrypting it, allowing privacy preserving data processing and analy...
Insider Threat
Insider Threat refers to risks posed by employees, contractors, or trusted insiders who misuse access to an organization’s data, system...
Vault Platform
Vault Platform refers to multiple real world concepts and products named Vault Platform, including HashiCorp Vault (a secrets management ...
SentinelOne
SentinelOne is a cybersecurity company known for its autonomous endpoint protection platform leveraging AI for threat detection, response...
Orca Security
Orca Security is a cybersecurity company known for delivering cloud security platform solutions, which has become a notable topic in clou...
Insurtech
Insurtech refers to the use of technology to transform the insurance industry, encompassing digital distribution, AI underwriting and pri...
Socure
Socure is a time digital identity verification and fraud prevention platform that leverages AI and biometric data to authenticate users a...
One Concern
One Concern is a company that applies AI and geospatial analytics to model disaster risk, optimize resilience planning, and aid emergency...
Snyk
Snyk is a developer first application security platform that helps teams find, fix, and monitor vulnerabilities in open source dependenci...
Air Gap
Air gap refers to physically isolating a computer or network from unsecured networks to prevent cyberattacks by ensuring no direct networ...
Hack The Box
Hack The Box is a cybersecurity training and hands on penetration testing platform that provides labs, challenges, and career oriented co...
SecurityScorecard
SecurityScorecard is a cybersecurity rating and third party risk management platform that assesses the security posture of organizations ...
Cloud Computing Security
Cloud Computing Security is a and established field focusing on protecting data, workloads, and access in cloud environments across IaaS,...
KeePassXC
KeePassXC is a cross platform open source password manager that derives from KeePass and integrates with KeePassXC Browser, offering loca...
Privilege Escalation
Privilege escalation is a longstanding cybersecurity concept referring to attackers elevating their access rights within a system to obta...
Auth0
Auth0 is a world identity and access management platform that provides authentication and authorization services for applications. It hel...
DevSecOps
DevSecOps is a and established approach integrating security practices into the software development lifecycle, aiming to shift security ...
BlueVoyant
BlueVoyant is a cybersecurity company specializing in threat intelligence, managed detection and response, and security services for ente...
Smishing
Smishing is the act of delivering malicious SMS messages to deceive users into revealing personal information or credentials, representin...