Trends is free while in Beta

Discover Trends in Cybersecurity

We surface rapidly growing trends in Cybersecurity before they take off.

145%
(5y)
162%
(1y)
-6%
(3mo)

Passwordless authentication is a, established trend in digital security that eliminates the need for traditional passwords by leveraging ...

Blocksi

27,100 vol/mo
141%
(5y)
30%
(1y)
-28%
(3mo)

Blocksi is a company offering classroom management and web filtering solutions for schools, universities, and organizations, focusing on ...

DNSFilter

4,400 vol/mo
140%
(5y)
37%
(1y)
65%
(3mo)

DNSFilter is a cybersecurity company specializing in DNS based content and threat filtering to protect networks from malware, phishing, a...

137%
(5y)
54%
(1y)
3%
(3mo)

Security as a Service (SECaaS) is a cloud delivered model where security capabilities such as identity, threat detection, firewalling, SI...

ZTNA

3,600 vol/mo
133%
(5y)
64%
(1y)
10%
(3mo)

ZTNA (Zero Trust Network Access) is a security paradigm and enterprise networking approach that grants least privilege access to applicat...

Abnormal Security

5,400 vol/mo
129%
(5y)
0%
(1y)
44%
(3mo)

Abnormal Security is a cybersecurity company focused on AI driven email security to prevent phishing, business email compromise, and othe...

Passwordless

880 vol/mo
128%
(5y)
221%
(1y)
105%
(3mo)

Passwordless authentication is a security and usability trend where users sign in without passwords, using methods such as hardware keys,...

Cyberattack

40,500 vol/mo
127%
(5y)
43%
(1y)
20%
(3mo)

Cyberattack refers to deliberate unauthorized access, disruption, or manipulation of computers, networks, or data, typically conducted by...

Data Exfiltration

1,000 vol/mo
122%
(5y)
128%
(1y)
34%
(3mo)

Data exfiltration is the unauthorized transfer of data from an organization to an external destination, often driven by cybercrime, insid...

Cybersecurity

301,000 vol/mo
119%
(5y)
107%
(1y)
13%
(3mo)

Cybersecurity is a mature, ongoing global trend focused on protecting digital assets, networks, and users from increasingly sophisticated...

119%
(5y)
124%
(1y)
42%
(3mo)

Multi Factor Authentication (MFA) is a security approach requiring two or more independent credentials to verify a user’s identity, str...

116%
(5y)
193%
(1y)
43%
(3mo)

Fraud Detection is a mature field focused on identifying and preventing fraudulent activities across financial services, e commerce, and ...

BigID

2,900 vol/mo
104%
(5y)
60%
(1y)
10%
(3mo)

BigID is a data privacy and security company that provides data discovery, classification, and protection solutions using AI to help ente...

101%
(5y)
122%
(1y)
21%
(3mo)

Threat intelligence is the practice of collecting, analyzing, and disseminating information about cyber threats to inform defense decisio...

Cybersecurity Jobs

74,000 vol/mo
96%
(5y)
29%
(1y)
21%
(3mo)

Cybersecurity jobs encompass roles focused on protecting systems, networks, and data from cyber threats; demand is driven by increasing c...

Legit Security

590 vol/mo
95%
(5y)
75%
(1y)
25%
(3mo)

Legit Security is a cybersecurity company specializing in software supply chain security and application security posture management. The...

94%
(5y)
29%
(1y)
13%
(3mo)

Cybersecurity Certification is a trend around formal credentialing for cybersecurity skills, driven by the need for validated expertise i...

Menlo Security

4,400 vol/mo
92%
(5y)
80%
(1y)
53%
(3mo)

Menlo Security is a cybersecurity company specializing in browser isolation and secure web gateway solutions designed to render web conte...

Zero Trust

6,600 vol/mo
92%
(5y)
132%
(1y)
80%
(3mo)

Zero Trust is a cybersecurity framework and philosophy that requires verification of every user and device, irrespective of location, and...

NordPass

27,100 vol/mo
91%
(5y)
18%
(1y)
-3%
(3mo)

NordPass is a password management solution developed by Nord Security, part of the broader family of cybersecurity and digital privacy to...

Fortinac

880 vol/mo
90%
(5y)
56%
(1y)
20%
(3mo)

FortiNAC is Fortinet’s network access control (NAC) solution that manages device authentication, policy enforcement, and segmentation t...