Discover Trends in Cybersecurity
We surface rapidly growing trends in Cybersecurity before they take off.
Zero Trust
Zero Trust is a cybersecurity framework and philosophy that requires verification of every user and device, irrespective of location, and...
NordPass
NordPass is a password management solution developed by Nord Security, part of the broader family of cybersecurity and digital privacy to...
Fortinac
FortiNAC is Fortinet’s network access control (NAC) solution that manages device authentication, policy enforcement, and segmentation t...
Cyber Insurance
Cyber insurance is a mature and evolving insurance segment that covers losses from cyber threats such as data breaches, ransomware, and b...
Netskope
Netskope is a company specializing in cloud security, data protection, and secure access service edge (SASE) solutions, reflecting a broa...
IT Security Specialist
The trend centers on the rising demand for IT security specialists as cyber threats intensify, driving organizations to hire, upskill, an...
MFA Authenticator
MFA Authenticator refers to mobile apps and software used for multi factor authentication, such as Google Authenticator, Microsoft Authen...
SheerID
SheerID is a identity verification company that enables brands to confirm consumer eligibility for discounts, seniority, student status, ...
HackerOne
HackerOne is a, established platform that operates a global bug bounty and vulnerability disclosure program ecosystem, connecting securit...
Claroty
Claroty is a leading cybersecurity company specializing in Operational Technology (OT) and Industrial Control Systems (ICS) security, foc...
Recorded Future
Recorded Future is a time threat intelligence platform that aggregates and analyzes data from open, dark, and technical sources to identi...
Homomorphic Encryption
Homomorphic encryption enables computation on encrypted data without decrypting it, allowing privacy preserving data processing and analy...
Insider Threat
Insider Threat refers to risks posed by employees, contractors, or trusted insiders who misuse access to an organization’s data, system...
Vault Platform
Vault Platform refers to multiple real world concepts and products named Vault Platform, including HashiCorp Vault (a secrets management ...
SentinelOne
SentinelOne is a cybersecurity company known for its autonomous endpoint protection platform leveraging AI for threat detection, response...
Orca Security
Orca Security is a cybersecurity company known for delivering cloud security platform solutions, which has become a notable topic in clou...
Insurtech
Insurtech refers to the use of technology to transform the insurance industry, encompassing digital distribution, AI underwriting and pri...
Socure
Socure is a time digital identity verification and fraud prevention platform that leverages AI and biometric data to authenticate users a...
One Concern
One Concern is a company that applies AI and geospatial analytics to model disaster risk, optimize resilience planning, and aid emergency...
Snyk
Snyk is a developer first application security platform that helps teams find, fix, and monitor vulnerabilities in open source dependenci...
Air Gap
Air gap refers to physically isolating a computer or network from unsecured networks to prevent cyberattacks by ensuring no direct networ...
Hack The Box
Hack The Box is a cybersecurity training and hands on penetration testing platform that provides labs, challenges, and career oriented co...
SecurityScorecard
SecurityScorecard is a cybersecurity rating and third party risk management platform that assesses the security posture of organizations ...
Cloud Computing Security
Cloud Computing Security is a and established field focusing on protecting data, workloads, and access in cloud environments across IaaS,...
KeePassXC
KeePassXC is a cross platform open source password manager that derives from KeePass and integrates with KeePassXC Browser, offering loca...
Privilege Escalation
Privilege escalation is a longstanding cybersecurity concept referring to attackers elevating their access rights within a system to obta...
Auth0
Auth0 is a world identity and access management platform that provides authentication and authorization services for applications. It hel...
DevSecOps
DevSecOps is a and established approach integrating security practices into the software development lifecycle, aiming to shift security ...
BlueVoyant
BlueVoyant is a cybersecurity company specializing in threat intelligence, managed detection and response, and security services for ente...
Smishing
Smishing is the act of delivering malicious SMS messages to deceive users into revealing personal information or credentials, representin...