Discover Trends in Cybersecurity
We surface rapidly growing trends in Cybersecurity before they take off.
Zero Trust
Zero Trust is a cybersecurity framework and philosophy that requires verification of every user and device, irrespective of location, and...
NordPass
NordPass is a password management solution developed by Nord Security, part of the broader family of cybersecurity and digital privacy to...
Fortinac
FortiNAC is Fortinet’s network access control (NAC) solution that manages device authentication, policy enforcement, and segmentation t...
Cyber Insurance
Cyber insurance is a mature and evolving insurance segment that covers losses from cyber threats such as data breaches, ransomware, and b...
Netskope
Netskope is a company specializing in cloud security, data protection, and secure access service edge (SASE) solutions, reflecting a broa...
IT Security Specialist
The trend centers on the rising demand for IT security specialists as cyber threats intensify, driving organizations to hire, upskill, an...
MFA Authenticator
MFA Authenticator refers to mobile apps and software used for multi factor authentication, such as Google Authenticator, Microsoft Authen...
SheerID
SheerID is a identity verification company that enables brands to confirm consumer eligibility for discounts, seniority, student status, ...
HackerOne
HackerOne is a, established platform that operates a global bug bounty and vulnerability disclosure program ecosystem, connecting securit...
Claroty
Claroty is a leading cybersecurity company specializing in Operational Technology (OT) and Industrial Control Systems (ICS) security, foc...
Recorded Future
Recorded Future is a time threat intelligence platform that aggregates and analyzes data from open, dark, and technical sources to identi...
Homomorphic Encryption
Homomorphic encryption enables computation on encrypted data without decrypting it, allowing privacy preserving data processing and analy...
Insider Threat
Insider Threat refers to risks posed by employees, contractors, or trusted insiders who misuse access to an organization’s data, system...
Vault Platform
Vault Platform refers to multiple real world concepts and products named Vault Platform, including HashiCorp Vault (a secrets management ...
SentinelOne
SentinelOne is a cybersecurity company known for its autonomous endpoint protection platform leveraging AI for threat detection, response...
Orca Security
Orca Security is a cybersecurity company known for delivering cloud security platform solutions, which has become a notable topic in clou...
Insurtech
Insurtech refers to the use of technology to transform the insurance industry, encompassing digital distribution, AI underwriting and pri...
Socure
Socure is a time digital identity verification and fraud prevention platform that leverages AI and biometric data to authenticate users a...
One Concern
One Concern is a company that applies AI and geospatial analytics to model disaster risk, optimize resilience planning, and aid emergency...
Snyk
Snyk is a developer first application security platform that helps teams find, fix, and monitor vulnerabilities in open source dependenci...
Air Gap
Air gap refers to physically isolating a computer or network from unsecured networks to prevent cyberattacks by ensuring no direct networ...
Hack The Box
Hack The Box is a cybersecurity training and hands on penetration testing platform that provides labs, challenges, and career oriented co...
SecurityScorecard
SecurityScorecard is a cybersecurity rating and third party risk management platform that assesses the security posture of organizations ...
Cloud Computing Security
Cloud Computing Security is a and established field focusing on protecting data, workloads, and access in cloud environments across IaaS,...
KeePassXC
KeePassXC is a cross platform open source password manager that derives from KeePass and integrates with KeePassXC Browser, offering loca...
Privilege Escalation
Privilege escalation is a longstanding cybersecurity concept referring to attackers elevating their access rights within a system to obta...
Auth0
Auth0 is a world identity and access management platform that provides authentication and authorization services for applications. It hel...
DevSecOps
DevSecOps is a and established approach integrating security practices into the software development lifecycle, aiming to shift security ...
BlueVoyant
BlueVoyant is a cybersecurity company specializing in threat intelligence, managed detection and response, and security services for ente...
Smishing
Smishing is the act of delivering malicious SMS messages to deceive users into revealing personal information or credentials, representin...
JumpCloud
JumpCloud is a company providing cloud based identity and access management (IAM) and directory services, enabling centralized user authe...
Virtual Private Network
A Virtual Private Network (VPN) is a service that creates a secure, encrypted tunnel for internet traffic, enabling private browsing, byp...
Peraton
Peraton is a U.S. national security technology company delivering government solutions in defense, intelligence, space, cyber, and homela...
KnowBe4
KnowBe4 is a leading provider of security awareness training and phishing simulation platforms that help organizations train employees to...
BitSight
BitSight represents a growing trend in quantifying cyber risk through continuous security ratings, enabling enterprises to monitor, compa...
Qualys
Qualys is a cybersecurity company specializing in cloud based vulnerability management and security compliance solutions, widely recogniz...
Spear Phishing
Spear phishing is a targeted form of phishing where attackers customize messages and delivery to specific individuals or organizations to...
Identity and Access Management Tools
Identity and Access Management (IAM) Tools refer to software platforms that manage digital identities and control access to resources acr...
Secure Access Service Edge
Secure Access Service Edge (SASE) is a, established cybersecurity and networking paradigm that combines wide area networking (WAN) capabi...
Hoxhunt
Hoxhunt is a cybersecurity company known for phishing defense platform and security awareness training, including phishing simulation and...
Nozomi Networks
Nozomi Networks is a cybersecurity company specializing in OT/ICS protection and visibility. The trend centers on industrial control syst...
Data Security Posture Management
Data Security Posture Management (DSPM) is a, established security practice and category focused on continuously discovering, inventoryin...
Banking Cybersecurity
Banking Cybersecurity is a, established trend focusing on protecting financial institutions, their customers, and critical payment infras...
Infisical
Infisical is an open source secrets management platform that secures and automates handling of API keys, credentials, and environment var...
Cloud Workload Protection
Cloud Workload Protection is a category of security platforms designed to continuously monitor, protect, and govern workloads across clou...
Air-gapped
Air gapped refers to networks that are physically isolated from unsecured networks (like the Internet) to prevent unauthorized data trans...
Software Supply Chain Security
Software Supply Chain Security is a and established field focused on protecting software as it moves from development to production, incl...
Cloud Security Posture Management
Cloud Security Posture Management is a mature cybersecurity category that continuously monitors and improves the security of cloud enviro...
Outsourced Security
Outsourced security refers to organizations leveraging external security providers and managed services to monitor, detect, and respond t...
Scope Security
Scope Security is a healthcare cybersecurity company focused on managed detection and response to protect hospitals and provider networks...
Trulioo
Trulioo is a global identity verification company that provides data and document based identity verification solutions to enable KYC/AM...
Modulus Data
Modulus Data is a company operating in the data management and data governance space, known for providing a platform and services around ...
Sublime Security
Sublime Security is a, growing cybersecurity company specializing in AI powered email security. It has gained notable recognition in 2026...
SentiLink
SentiLink is a company specializing in identity verification and fraud prevention, notably focusing on detecting synthetic identities dur...
Akeyless
Akeyless is a cloud based secrets management platform that centralizes, secures, and automates access to credentials such as API keys, to...
Zitadel
ZITADEL is an open source, self hosted and SaaS identity and access management (IAM) platform designed to streamline authentication, auth...
Ox Security
Ox Security is a cybersecurity company focused on cloud native security and observability, offering solutions to detect and respond to th...
EasyDMARC
easyDMARC is a, established platform that provides DMARC, DKIM, and SPF email authentication monitoring and enforcement, helping organiza...
Cycode
Cycode is a cybersecurity company specializing in software supply chain security and code security posture management, focusing on securi...
Morelogin
MoreLogin is a antidetect/browser based account management platform that enables running multiple isolated browser profiles and cloud dev...