Discover Trends in Cybersecurity
We surface rapidly growing trends in Cybersecurity before they take off.
KeePassXC
KeePassXC is a cross platform open source password manager that derives from KeePass and integrates with KeePassXC Browser, offering loca...
Privilege Escalation
Privilege escalation is a longstanding cybersecurity concept referring to attackers elevating their access rights within a system to obta...
Auth0
Auth0 is a world identity and access management platform that provides authentication and authorization services for applications. It hel...
DevSecOps
DevSecOps is a and established approach integrating security practices into the software development lifecycle, aiming to shift security ...
BlueVoyant
BlueVoyant is a cybersecurity company specializing in threat intelligence, managed detection and response, and security services for ente...
Smishing
Smishing is the act of delivering malicious SMS messages to deceive users into revealing personal information or credentials, representin...
JumpCloud
JumpCloud is a company providing cloud based identity and access management (IAM) and directory services, enabling centralized user authe...
Virtual Private Network
A Virtual Private Network (VPN) is a service that creates a secure, encrypted tunnel for internet traffic, enabling private browsing, byp...
Peraton
Peraton is a U.S. national security technology company delivering government solutions in defense, intelligence, space, cyber, and homela...
KnowBe4
KnowBe4 is a leading provider of security awareness training and phishing simulation platforms that help organizations train employees to...
BitSight
BitSight represents a growing trend in quantifying cyber risk through continuous security ratings, enabling enterprises to monitor, compa...
Qualys
Qualys is a cybersecurity company specializing in cloud based vulnerability management and security compliance solutions, widely recogniz...
Spear Phishing
Spear phishing is a targeted form of phishing where attackers customize messages and delivery to specific individuals or organizations to...
Identity and Access Management Tools
Identity and Access Management (IAM) Tools refer to software platforms that manage digital identities and control access to resources acr...
Secure Access Service Edge
Secure Access Service Edge (SASE) is a, established cybersecurity and networking paradigm that combines wide area networking (WAN) capabi...
Hoxhunt
Hoxhunt is a cybersecurity company known for phishing defense platform and security awareness training, including phishing simulation and...
Nozomi Networks
Nozomi Networks is a cybersecurity company specializing in OT/ICS protection and visibility. The trend centers on industrial control syst...
Data Security Posture Management
Data Security Posture Management (DSPM) is a, established security practice and category focused on continuously discovering, inventoryin...
Banking Cybersecurity
Banking Cybersecurity is a, established trend focusing on protecting financial institutions, their customers, and critical payment infras...
Infisical
Infisical is an open source secrets management platform that secures and automates handling of API keys, credentials, and environment var...
Cloud Workload Protection
Cloud Workload Protection is a category of security platforms designed to continuously monitor, protect, and govern workloads across clou...