Discover Trends in Cybersecurity
We surface rapidly growing trends in Cybersecurity before they take off.
SecOps
Security Operations (SecOps) is the discipline of continuously monitoring, detecting, and responding to cybersecurity incidents across an...
Trivy
Trivy is a widely used open source vulnerability scanner for container images, filesystem, and repository contents, developed by Aqua Sec...
Cybersecurity Technology
Cybersecurity technology encompasses tools, platforms, and practices designed to detect, prevent, respond to, and recover from cyber thre...
Vaultwarden
Vaultwarden is a self hosted, community driven alternative to Bitwarden designed for running a private password manager server on persona...
Canary Technologies
Canary Technologies is a company specializing in cloud based access control and guest experience solutions for hospitality and property m...
Wazuh
Wazuh is an open source security monitoring and SIEM platform that aggregates and analyzes security events from endpoints, servers, and c...
Stytch
Stytch is a company offering passwordless authentication and identity APIs, driving a shift in developers adopting frictionless login exp...
Veriff
Veriff is a time identity verification platform that uses AI powered checks to confirm user identities online, widely adopted across fint...
Upguard
UpGuard is a cybersecurity company specializing in risk management, vendor risk, and cyber exposure monitoring to help organizations iden...
Avanan
Avanan is a cybersecurity company specializing in cloud email security, providing AI driven phishing and malware protection and integrati...
Proton VPN
Proton VPN is a, established privacy focused virtual private network service developed by Proton AG, known for its emphasis on security, ...
Cybersecurity Training
Cybersecurity training is a, established field focused on educating individuals and organizations to prevent, detect, and respond to cybe...
Vanta
Vanta is a leading security and compliance automation platform that helps companies achieve and maintain standards like SOC 2 and ISO 270...
Drata
Drata is a company offering automated continuous security and compliance orchestration, widely adopted to streamline SOC 2, ISO 27001, an...
Data Privacy
Data privacy is the ongoing emphasis on protecting personal information, governing data collection, usage, storage, and consent across di...
Credential Stuffing
Credential stuffing is a cyberattack technique that automates login attempts using lists of compromised credentials to gain unauthorized ...
OPNsense
OPNsense is a, active open source firewall and routing platform based on HardenedBSD, known as a fork of pfSense. It is developed and dis...
Flock Safety
Flock Safety is a company that builds automated license plate reader (ALPR) camera networks used by communities and law enforcement for p...
Cloudflare
Cloudflare is a, established company providing edge networking, security, content delivery, and related services that optimize and protec...
Managed Security Services
Managed Security Services is a and established market where third party providers deliver ongoing security monitoring, threat detection, ...
OT Security
OT Security refers to protecting operational technology environments, including industrial control systems, SCADA, and process automation...