Discover Trends in Cybersecurity
We surface rapidly growing trends in Cybersecurity before they take off.
Data Privacy Tools
Data privacy tools are software and services that help organizations protect personal data, manage user consent, enforce data minimizatio...
Cyera
Cyera is a cybersecurity company specializing in cloud data security and data governance, focusing on discovering, classifying, and secur...
Voice Phishing
Voice Phishing (vishing) is the deceptive practice of using telephone calls to trick individuals into divulging sensitive information or ...
Post Quantum Cryptography
Cybersecurity Awareness Training
Cybersecurity Awareness Training is a and established practice focusing on educating users and employees to recognize phishing, social en...
Security Posture Management
Security Posture Management (SPM) is a cybersecurity discipline and product category that continuously assesses, visualizes, and improves...
Managed Detection and Response
Managed Detection and Response (MDR) is a cybersecurity service that combines threat monitoring, detection, and response automation with ...
Zero Networks
Zero Networks is a company focusing on zero trust networking and secure remote access, reflecting broader enterprise adoption of zero tru...
Privacy Engineering
Privacy Engineering is a discipline focused on embedding privacy by design into systems, products, and data pipelines through governance,...
Military Cybersecurity
Military cybersecurity refers to the defense sector's efforts to protect national defense networks, weapons systems, and critical infrast...
NinjaOne
NinjaOne is an established IT management platform focused on remote monitoring and management (RMM), endpoint security, and IT operations...
Cloud Security Management
Cloud Security Management is the discipline of governing, monitoring, and enforcing security across multi cloud and hybrid environments u...
Cato Networks
Cato Networks is a cybersecurity company specializing in Secure Access Service Edge (SASE) and cloud native secure connectivity, widely d...
Tailscale
Tailscale is a, established company that provides a zero trun VPN mesh networking platform built on WireGuard, enabling secure, private n...
Cnapp
CNAPP (Cloud Native Application Protection Platform) is a, established category that consolidates cloud native security capabilities acro...
One-Time Password
One Time Password (OTP) is a two factor authentication method that generates a temporary numeric or alphanumeric code for user verificati...
Allowlist
Allowlist has emerged as a security and access control concept where only explicitly approved entities (users, IPs, devices, apps) are gr...
PreVeil
PreVeil is a company delivering enterprise grade, end to end encrypted email and data protection for cloud environments, gaining attentio...
Keyfactor
Keyfactor is a leading provider of certificate based identity, PKI and cryptographic management solutions used to automate and secure dig...
SecOps
Security Operations (SecOps) is the discipline of continuously monitoring, detecting, and responding to cybersecurity incidents across an...
Trivy
Trivy is a widely used open source vulnerability scanner for container images, filesystem, and repository contents, developed by Aqua Sec...
Cybersecurity Technology
Cybersecurity technology encompasses tools, platforms, and practices designed to detect, prevent, respond to, and recover from cyber thre...
Canary Technologies
Canary Technologies is a company specializing in cloud based access control and guest experience solutions for hospitality and property m...
Stytch
Stytch is a company offering passwordless authentication and identity APIs, driving a shift in developers adopting frictionless login exp...
Veriff
Veriff is a time identity verification platform that uses AI powered checks to confirm user identities online, widely adopted across fint...
Upguard
UpGuard is a cybersecurity company specializing in risk management, vendor risk, and cyber exposure monitoring to help organizations iden...
Cybersecurity Training
Cybersecurity training is a, established field focused on educating individuals and organizations to prevent, detect, and respond to cybe...
Vanta
Vanta is a leading security and compliance automation platform that helps companies achieve and maintain standards like SOC 2 and ISO 270...
Data Privacy
Data privacy is the ongoing emphasis on protecting personal information, governing data collection, usage, storage, and consent across di...
Credential Stuffing
Credential stuffing is a cyberattack technique that automates login attempts using lists of compromised credentials to gain unauthorized ...