Discover Trends in Cybersecurity
We surface rapidly growing trends in Cybersecurity before they take off.
Data Privacy Tools
Data privacy tools are software and services that help organizations protect personal data, manage user consent, enforce data minimizatio...
Cyera
Cyera is a cybersecurity company specializing in cloud data security and data governance, focusing on discovering, classifying, and secur...
Voice Phishing
Voice Phishing (vishing) is the deceptive practice of using telephone calls to trick individuals into divulging sensitive information or ...
Post Quantum Cryptography
Cybersecurity Awareness Training
Cybersecurity Awareness Training is a and established practice focusing on educating users and employees to recognize phishing, social en...
Security Posture Management
Security Posture Management (SPM) is a cybersecurity discipline and product category that continuously assesses, visualizes, and improves...
Managed Detection and Response
Managed Detection and Response (MDR) is a cybersecurity service that combines threat monitoring, detection, and response automation with ...
Zero Networks
Zero Networks is a company focusing on zero trust networking and secure remote access, reflecting broader enterprise adoption of zero tru...
Privacy Engineering
Privacy Engineering is a discipline focused on embedding privacy by design into systems, products, and data pipelines through governance,...
Military Cybersecurity
Military cybersecurity refers to the defense sector's efforts to protect national defense networks, weapons systems, and critical infrast...
NinjaOne
NinjaOne is an established IT management platform focused on remote monitoring and management (RMM), endpoint security, and IT operations...
Cloud Security Management
Cloud Security Management is the discipline of governing, monitoring, and enforcing security across multi cloud and hybrid environments u...
Cato Networks
Cato Networks is a cybersecurity company specializing in Secure Access Service Edge (SASE) and cloud native secure connectivity, widely d...
Tailscale
Tailscale is a, established company that provides a zero trun VPN mesh networking platform built on WireGuard, enabling secure, private n...
Cnapp
CNAPP (Cloud Native Application Protection Platform) is a, established category that consolidates cloud native security capabilities acro...
One-Time Password
One Time Password (OTP) is a two factor authentication method that generates a temporary numeric or alphanumeric code for user verificati...
Allowlist
Allowlist has emerged as a security and access control concept where only explicitly approved entities (users, IPs, devices, apps) are gr...
PreVeil
PreVeil is a company delivering enterprise grade, end to end encrypted email and data protection for cloud environments, gaining attentio...
Keyfactor
Keyfactor is a leading provider of certificate based identity, PKI and cryptographic management solutions used to automate and secure dig...
SecOps
Security Operations (SecOps) is the discipline of continuously monitoring, detecting, and responding to cybersecurity incidents across an...
Trivy
Trivy is a widely used open source vulnerability scanner for container images, filesystem, and repository contents, developed by Aqua Sec...
Cybersecurity Technology
Cybersecurity technology encompasses tools, platforms, and practices designed to detect, prevent, respond to, and recover from cyber thre...
Canary Technologies
Canary Technologies is a company specializing in cloud based access control and guest experience solutions for hospitality and property m...
Stytch
Stytch is a company offering passwordless authentication and identity APIs, driving a shift in developers adopting frictionless login exp...
Veriff
Veriff is a time identity verification platform that uses AI powered checks to confirm user identities online, widely adopted across fint...
Upguard
UpGuard is a cybersecurity company specializing in risk management, vendor risk, and cyber exposure monitoring to help organizations iden...
Cybersecurity Training
Cybersecurity training is a, established field focused on educating individuals and organizations to prevent, detect, and respond to cybe...
Vanta
Vanta is a leading security and compliance automation platform that helps companies achieve and maintain standards like SOC 2 and ISO 270...
Data Privacy
Data privacy is the ongoing emphasis on protecting personal information, governing data collection, usage, storage, and consent across di...
Credential Stuffing
Credential stuffing is a cyberattack technique that automates login attempts using lists of compromised credentials to gain unauthorized ...
Cloudflare
Cloudflare is a, established company providing edge networking, security, content delivery, and related services that optimize and protec...
Managed Security Services
Managed Security Services is a and established market where third party providers deliver ongoing security monitoring, threat detection, ...
OT Security
OT Security refers to protecting operational technology environments, including industrial control systems, SCADA, and process automation...
Passwordless Authentication
Passwordless authentication is a, established trend in digital security that eliminates the need for traditional passwords by leveraging ...
DNSFilter
DNSFilter is a cybersecurity company specializing in DNS based content and threat filtering to protect networks from malware, phishing, a...
Passwordless
Passwordless authentication is a security and usability trend where users sign in without passwords, using methods such as hardware keys,...
Data Exfiltration
Data exfiltration is the unauthorized transfer of data from an organization to an external destination, often driven by cybercrime, insid...
Cybersecurity
Cybersecurity is a mature, ongoing global trend focused on protecting digital assets, networks, and users from increasingly sophisticated...
Multi-Factor Authentication
Multi Factor Authentication (MFA) is a security approach requiring two or more independent credentials to verify a user’s identity, str...
Fraud Detection
Fraud Detection is a mature field focused on identifying and preventing fraudulent activities across financial services, e commerce, and ...
BigID
BigID is a data privacy and security company that provides data discovery, classification, and protection solutions using AI to help ente...
Threat Intelligence
Threat intelligence is the practice of collecting, analyzing, and disseminating information about cyber threats to inform defense decisio...
Zero Trust
Zero Trust is a cybersecurity framework and philosophy that requires verification of every user and device, irrespective of location, and...
Fortinac
FortiNAC is Fortinet’s network access control (NAC) solution that manages device authentication, policy enforcement, and segmentation t...
IT Security Specialist
The trend centers on the rising demand for IT security specialists as cyber threats intensify, driving organizations to hire, upskill, an...
Claroty
Claroty is a leading cybersecurity company specializing in Operational Technology (OT) and Industrial Control Systems (ICS) security, foc...
Homomorphic Encryption
Homomorphic encryption enables computation on encrypted data without decrypting it, allowing privacy preserving data processing and analy...
Vault Platform
Vault Platform refers to multiple real world concepts and products named Vault Platform, including HashiCorp Vault (a secrets management ...
Orca Security
Orca Security is a cybersecurity company known for delivering cloud security platform solutions, which has become a notable topic in clou...
Insurtech
Insurtech refers to the use of technology to transform the insurance industry, encompassing digital distribution, AI underwriting and pri...
Air Gap
Air gap refers to physically isolating a computer or network from unsecured networks to prevent cyberattacks by ensuring no direct networ...
SecurityScorecard
SecurityScorecard is a cybersecurity rating and third party risk management platform that assesses the security posture of organizations ...
Identity and Access Management Tools
Identity and Access Management (IAM) Tools refer to software platforms that manage digital identities and control access to resources acr...
Secure Access Service Edge
Secure Access Service Edge (SASE) is a, established cybersecurity and networking paradigm that combines wide area networking (WAN) capabi...
Hoxhunt
Hoxhunt is a cybersecurity company known for phishing defense platform and security awareness training, including phishing simulation and...
Nozomi Networks
Nozomi Networks is a cybersecurity company specializing in OT/ICS protection and visibility. The trend centers on industrial control syst...
Data Security Posture Management
Data Security Posture Management (DSPM) is a, established security practice and category focused on continuously discovering, inventoryin...
Banking Cybersecurity
Banking Cybersecurity is a, established trend focusing on protecting financial institutions, their customers, and critical payment infras...
Infisical
Infisical is an open source secrets management platform that secures and automates handling of API keys, credentials, and environment var...
Cloud Workload Protection
Cloud Workload Protection is a category of security platforms designed to continuously monitor, protect, and govern workloads across clou...