Discover Trends in Cybersecurity
We surface rapidly growing trends in Cybersecurity before they take off.
AML Software
AML Software is a category of software solutions that automate anti money laundering compliance, transaction monitoring, and suspicious a...
Cybersecurity Awareness Training
Cybersecurity Awareness Training is a and established practice focusing on educating users and employees to recognize phishing, social en...
Security Posture Management
Security Posture Management (SPM) is a cybersecurity discipline and product category that continuously assesses, visualizes, and improves...
Managed Detection and Response
Managed Detection and Response (MDR) is a cybersecurity service that combines threat monitoring, detection, and response automation with ...
Military Cybersecurity
Military cybersecurity refers to the defense sector's efforts to protect national defense networks, weapons systems, and critical infrast...
Cybersecurity Technology
Cybersecurity technology encompasses tools, platforms, and practices designed to detect, prevent, respond to, and recover from cyber thre...
Upguard
UpGuard is a cybersecurity company specializing in risk management, vendor risk, and cyber exposure monitoring to help organizations iden...
Avanan
Avanan is a cybersecurity company specializing in cloud email security, providing AI driven phishing and malware protection and integrati...
Proton VPN
Proton VPN is a, established privacy focused virtual private network service developed by Proton AG, known for its emphasis on security, ...
Cybersecurity Training
Cybersecurity training is a, established field focused on educating individuals and organizations to prevent, detect, and respond to cybe...
Vanta
Vanta is a leading security and compliance automation platform that helps companies achieve and maintain standards like SOC 2 and ISO 270...
Drata
Drata is a company offering automated continuous security and compliance orchestration, widely adopted to streamline SOC 2, ISO 27001, an...
Flock Safety
Flock Safety is a company that builds automated license plate reader (ALPR) camera networks used by communities and law enforcement for p...
Managed Security Services
Managed Security Services is a and established market where third party providers deliver ongoing security monitoring, threat detection, ...
OT Security
OT Security refers to protecting operational technology environments, including industrial control systems, SCADA, and process automation...
Security as a Service
Security as a Service (SECaaS) is a cloud delivered model where security capabilities such as identity, threat detection, firewalling, SI...
Cyberattack
Cyberattack refers to deliberate unauthorized access, disruption, or manipulation of computers, networks, or data, typically conducted by...
Cybersecurity
Cybersecurity is a mature, ongoing global trend focused on protecting digital assets, networks, and users from increasingly sophisticated...
Fraud Detection
Fraud Detection is a mature field focused on identifying and preventing fraudulent activities across financial services, e commerce, and ...
Cybersecurity Jobs
Cybersecurity jobs encompass roles focused on protecting systems, networks, and data from cyber threats; demand is driven by increasing c...
Legit Security
Legit Security is a cybersecurity company specializing in software supply chain security and application security posture management. The...
Cybersecurity Certification
Cybersecurity Certification is a trend around formal credentialing for cybersecurity skills, driven by the need for validated expertise i...
Menlo Security
Menlo Security is a cybersecurity company specializing in browser isolation and secure web gateway solutions designed to render web conte...
Cyber Insurance
Cyber insurance is a mature and evolving insurance segment that covers losses from cyber threats such as data breaches, ransomware, and b...
IT Security Specialist
The trend centers on the rising demand for IT security specialists as cyber threats intensify, driving organizations to hire, upskill, an...
HackerOne
HackerOne is a, established platform that operates a global bug bounty and vulnerability disclosure program ecosystem, connecting securit...
Claroty
Claroty is a leading cybersecurity company specializing in Operational Technology (OT) and Industrial Control Systems (ICS) security, foc...
Recorded Future
Recorded Future is a time threat intelligence platform that aggregates and analyzes data from open, dark, and technical sources to identi...
Insider Threat
Insider Threat refers to risks posed by employees, contractors, or trusted insiders who misuse access to an organization’s data, system...
Orca Security
Orca Security is a cybersecurity company known for delivering cloud security platform solutions, which has become a notable topic in clou...
Insurtech
Insurtech refers to the use of technology to transform the insurance industry, encompassing digital distribution, AI underwriting and pri...
One Concern
One Concern is a company that applies AI and geospatial analytics to model disaster risk, optimize resilience planning, and aid emergency...
SecurityScorecard
SecurityScorecard is a cybersecurity rating and third party risk management platform that assesses the security posture of organizations ...
BlueVoyant
BlueVoyant is a cybersecurity company specializing in threat intelligence, managed detection and response, and security services for ente...
Smishing
Smishing is the act of delivering malicious SMS messages to deceive users into revealing personal information or credentials, representin...
KnowBe4
KnowBe4 is a leading provider of security awareness training and phishing simulation platforms that help organizations train employees to...
BitSight
BitSight represents a growing trend in quantifying cyber risk through continuous security ratings, enabling enterprises to monitor, compa...
Qualys
Qualys is a cybersecurity company specializing in cloud based vulnerability management and security compliance solutions, widely recogniz...
Spear Phishing
Spear phishing is a targeted form of phishing where attackers customize messages and delivery to specific individuals or organizations to...
Secure Access Service Edge
Secure Access Service Edge (SASE) is a, established cybersecurity and networking paradigm that combines wide area networking (WAN) capabi...
Hoxhunt
Hoxhunt is a cybersecurity company known for phishing defense platform and security awareness training, including phishing simulation and...
Risk Management Tech
Risk Management Tech refers to software and platforms designed to identify, assess, monitor, and mitigate risks across an organization. I...
Banking Cybersecurity
Banking Cybersecurity is a, established trend focusing on protecting financial institutions, their customers, and critical payment infras...
Outsourced Security
Outsourced security refers to organizations leveraging external security providers and managed services to monitor, detect, and respond t...
Scope Security
Scope Security is a healthcare cybersecurity company focused on managed detection and response to protect hospitals and provider networks...
Net Protections
Net Protections is a Japanese BNPL (Buy Now, Pay Later) provider whose growth and organizational innovations have attracted attention, in...
AI Penetration Testing
AI Penetration Testing is the use of artificial intelligence and machine learning to automate, augment, or accelerate security penetratio...
Cybersecurity Mesh
Cybersecurity Mesh is a security architecture approach that enables scalable, flexible protection by defining a composable, identity cent...
Transaction Monitoring Software
Transaction Monitoring Software is a mature category of compliance technology that detects suspicious financial activity in real time to ...
Cyber Threat Hunting
Cyber Threat Hunting is a and established discipline within cybersecurity focused on proactively detecting and mitigating threats within ...
Intigriti
Intigriti is a recognized bug bounty and vulnerability disclosure platform that connects organizations with security researchers to ident...
Blackpoint Cyber
Blackpoint Cyber is a cybersecurity company known for its endpoint detection and response (EDR) platform and managed security services ai...
Arctic Wolf Networks
Arctic Wolf Networks is a cybersecurity company focused on managed detection and response (MDR) and security operations center (SOC) serv...
AML Transaction Monitoring
AML Transaction Monitoring is a, established field within financial services focused on detecting and preventing money laundering and rel...
Ox Security
Ox Security is a cybersecurity company focused on cloud native security and observability, offering solutions to detect and respond to th...