Discover Trends in Cybersecurity
We surface rapidly growing trends in Cybersecurity before they take off.
Svix
Svix is a company that provides a scalable webhook infrastructure platform to manage, deliver, and monitor webhooks for applications and ...
Passkey
Passkey refers to passwordless authentication standards (FIDO2/WebAuthn) that enable sign in using cryptographic keys on devices, improvi...
Vaultwarden
Vaultwarden is a self hosted, community driven alternative to Bitwarden designed for running a private password manager server on persona...
Wazuh
Wazuh is an open source security monitoring and SIEM platform that aggregates and analyzes security events from endpoints, servers, and c...
Avanan
Avanan is a cybersecurity company specializing in cloud email security, providing AI driven phishing and malware protection and integrati...
Proton VPN
Proton VPN is a, established privacy focused virtual private network service developed by Proton AG, known for its emphasis on security, ...
Drata
Drata is a company offering automated continuous security and compliance orchestration, widely adopted to streamline SOC 2, ISO 27001, an...
OPNsense
OPNsense is a, active open source firewall and routing platform based on HardenedBSD, known as a fork of pfSense. It is developed and dis...
Flock Safety
Flock Safety is a company that builds automated license plate reader (ALPR) camera networks used by communities and law enforcement for p...
Blocksi
Blocksi is a company offering classroom management and web filtering solutions for schools, universities, and organizations, focusing on ...
Security as a Service
Security as a Service (SECaaS) is a cloud delivered model where security capabilities such as identity, threat detection, firewalling, SI...
ZTNA
ZTNA (Zero Trust Network Access) is a security paradigm and enterprise networking approach that grants least privilege access to applicat...
Abnormal Security
Abnormal Security is a cybersecurity company focused on AI driven email security to prevent phishing, business email compromise, and othe...
Cyberattack
Cyberattack refers to deliberate unauthorized access, disruption, or manipulation of computers, networks, or data, typically conducted by...
Cybersecurity Jobs
Cybersecurity jobs encompass roles focused on protecting systems, networks, and data from cyber threats; demand is driven by increasing c...
Legit Security
Legit Security is a cybersecurity company specializing in software supply chain security and application security posture management. The...
Cybersecurity Certification
Cybersecurity Certification is a trend around formal credentialing for cybersecurity skills, driven by the need for validated expertise i...
Menlo Security
Menlo Security is a cybersecurity company specializing in browser isolation and secure web gateway solutions designed to render web conte...
NordPass
NordPass is a password management solution developed by Nord Security, part of the broader family of cybersecurity and digital privacy to...
Cyber Insurance
Cyber insurance is a mature and evolving insurance segment that covers losses from cyber threats such as data breaches, ransomware, and b...
Netskope
Netskope is a company specializing in cloud security, data protection, and secure access service edge (SASE) solutions, reflecting a broa...
MFA Authenticator
MFA Authenticator refers to mobile apps and software used for multi factor authentication, such as Google Authenticator, Microsoft Authen...
SheerID
SheerID is a identity verification company that enables brands to confirm consumer eligibility for discounts, seniority, student status, ...
HackerOne
HackerOne is a, established platform that operates a global bug bounty and vulnerability disclosure program ecosystem, connecting securit...
Recorded Future
Recorded Future is a time threat intelligence platform that aggregates and analyzes data from open, dark, and technical sources to identi...
Insider Threat
Insider Threat refers to risks posed by employees, contractors, or trusted insiders who misuse access to an organization’s data, system...
SentinelOne
SentinelOne is a cybersecurity company known for its autonomous endpoint protection platform leveraging AI for threat detection, response...
Socure
Socure is a time digital identity verification and fraud prevention platform that leverages AI and biometric data to authenticate users a...
One Concern
One Concern is a company that applies AI and geospatial analytics to model disaster risk, optimize resilience planning, and aid emergency...
Snyk
Snyk is a developer first application security platform that helps teams find, fix, and monitor vulnerabilities in open source dependenci...
Hack The Box
Hack The Box is a cybersecurity training and hands on penetration testing platform that provides labs, challenges, and career oriented co...
Cloud Computing Security
Cloud Computing Security is a and established field focusing on protecting data, workloads, and access in cloud environments across IaaS,...
KeePassXC
KeePassXC is a cross platform open source password manager that derives from KeePass and integrates with KeePassXC Browser, offering loca...
Privilege Escalation
Privilege escalation is a longstanding cybersecurity concept referring to attackers elevating their access rights within a system to obta...
Auth0
Auth0 is a world identity and access management platform that provides authentication and authorization services for applications. It hel...
DevSecOps
DevSecOps is a and established approach integrating security practices into the software development lifecycle, aiming to shift security ...
JumpCloud
JumpCloud is a company providing cloud based identity and access management (IAM) and directory services, enabling centralized user authe...
Virtual Private Network
A Virtual Private Network (VPN) is a service that creates a secure, encrypted tunnel for internet traffic, enabling private browsing, byp...
Peraton
Peraton is a U.S. national security technology company delivering government solutions in defense, intelligence, space, cyber, and homela...
KnowBe4
KnowBe4 is a leading provider of security awareness training and phishing simulation platforms that help organizations train employees to...
BitSight
BitSight represents a growing trend in quantifying cyber risk through continuous security ratings, enabling enterprises to monitor, compa...
Qualys
Qualys is a cybersecurity company specializing in cloud based vulnerability management and security compliance solutions, widely recogniz...
Medical Device Cybersecurity
Medical Device Cybersecurity is a and growing field focused on protecting connected medical devices and healthcare networks from cyber th...
AI Penetration Testing
AI Penetration Testing is the use of artificial intelligence and machine learning to automate, augment, or accelerate security penetratio...