The Security Industry

The Security Industry Substack analyzes the cybersecurity sector, discussing trends, investments, product development, and startup dynamics. It covers the roles of investors, the importance of product choice over platform solutions, market growth, and the impact of technology trends like AI. It aims to provide insights on cybersecurity innovation, investment patterns, and company strategies.

Cybersecurity Trends Investment and Funding Product and Vendor Analysis Startup Ecosystem Technology Innovation Market Strategy Event Analysis Industry Challenges Security Solutions Regulatory and Policy Impacts

The hottest Substack posts of The Security Industry

And their main takeaways
6 implied HN points 06 Feb 23
  1. The cybersecurity industry is a complex ecosystem with various services and data being sold among companies.
  2. Participating in major cybersecurity events indicates a healthy and thriving company, making it a good indicator for potential sponsors or partners.
  3. Vendors in the cybersecurity industry often sell products, data, and services to other vendors through OEM relationships or compliance assistance.
5 implied HN points 01 Feb 23
  1. There are many cybersecurity vendors, with around 10% going through acquisitions each year.
  2. It takes a couple of years for new cybersecurity startups to be discovered.
  3. The average age of cybersecurity vendors founded after 1982 is 12.3 years.
6 implied HN points 12 Nov 22
  1. Do your own cybersecurity research - you can be an industry analyst
  2. Utilize a dashboard to quickly answer questions for yourself
  3. Consider how a research platform can help you get answers and insights faster
5 implied HN points 07 Dec 22
  1. Soft launch of monthly subscriptions for IT-Harvest Platform to known users first to prevent misuse.
  2. Monthly subscription offers full access to data on 3,188+ cybersecurity vendors and ability to download 500 vendor records monthly.
  3. Monthly subscriptions receive the same support as annual and include one call a month for advisory services.
5 implied HN points 30 Oct 22
  1. The IT-Harvest Dashboard is ready to scale for the cybersecurity industry research tool.
  2. Introducing a monthly subscription option to add flexibility and value to users.
  3. Offering a full-featured trial account and implementing a monthly subscription tier for immediate access to data and features.
Get a weekly roundup of the best Substack posts, by hacker news affinity:
5 implied HN points 22 Oct 22
  1. IT-Harvest aims to recreate the functionality of DataQuest for cybersecurity industry.
  2. Feedly's AI is used to gather news on specific companies for IT-Harvest Dashboard.
  3. Explore page allows subscribers to filter vendors quickly based on various criteria like funding and category.
5 implied HN points 17 Jul 22
  1. The Analyst Dashboard evolved into a fully featured SaaS product with expanding features and datasets.
  2. The complete data set on 2,874 vendors is useful for investors, analyst firms, corporate development teams, competitive intelligence teams, and marketers in the cybersecurity industry.
  3. New features added include event participation tracking, awards search function, and a spotlight feature for insights.
6 implied HN points 03 Apr 22
  1. A new SaaS app is created for tracking the cybersecurity industry
  2. The app serves the investment community with data and analysis services
  3. Different user groups like marketers, corporate development, and investment bankers benefit from the app
3 implied HN points 06 Sep 21
  1. 20 cybersecurity companies increased in valuation by 13% to $265.62 billion in 1H 2021.
  2. Crowdstrike remains the largest cybersecurity company with a market cap of $56.72 billion.
  3. Fortinet experienced remarkable growth, surpassing Palo Alto Networks in market cap in the first half of 2021.
1 implied HN point 16 Jun 22
  1. Typing pools were common for typing and secretarial work, but disappeared with word processors.
  2. Introduction of CAD in design work reduced errors and increased efficiency.
  3. Nocode tools, like Bubble.io, are revolutionizing app development by allowing creation without coding.
1 implied HN point 24 May 22
  1. Stock market is showing a decrease in cybersecurity stock valuations despite the demand for cybersecurity remaining high.
  2. During recessions, enterprise spending on security may decrease, but cybersecurity remains a long-term investment opportunity.
  3. The collapse of Russia might lead to reduced cybercrime, impacting cybersecurity spending, but cybersecurity will continue to grow with technological advancements.
1 implied HN point 18 Sep 20
  1. The post outlines a Four Step Vendor Viability Checklist.
  2. The checklist can be reviewed from home in four quick steps.
  3. The checklist is a helpful tool for assessing a vendor's viability.
1 implied HN point 02 Aug 20
  1. Gartner is the largest analyst firm with 1,008 analysts.
  2. Revenue per employee is a good way to judge a company's strength.
  3. Different analyst firms have varying revenue per analyst and business models.
0 implied HN points 09 May 21
  1. Vendors often use the same use cases to explain the value of their products.
  2. SIEMs are known for being noisy and causing alert fatigue in Security Operations Centers (SOCs).
  3. Threat Intelligence Platforms (TIPs) have the potential to replace SIEMs by addressing their shortcomings and reducing the workload for SOC personnel.
0 implied HN points 15 Jan 22
  1. IT-Harvest was founded with a vision to be a data-driven analyst firm.
  2. Initial experiences with Gartner's Dataquest were not fruitful for gathering needed cybersecurity industry data.
  3. Transitioning to a relational database allowed for better data analysis and informed decision-making at IT-Harvest.
0 implied HN points 17 Mar 20
  1. People in positions of power can sometimes overestimate their control and make decisions based on ego rather than practicality.
  2. Acquiring companies without a clear strategy or understanding of the market can lead to failure.
  3. Executives playing 'chair ball' in boardrooms can result in risky, ill-advised decisions that harm businesses in the long run.
0 implied HN points 31 Mar 21
  1. Learning from failure is important in history and business.
  2. Failures in the IT security industry can be difficult to recognize.
  3. Investors losing interest can lead to the failure of funded companies.
0 implied HN points 12 Dec 18
  1. Infrastructure changes can predict the future and lead to financial gains.
  2. 5G technology is extremely fast, reaching up to 70 gigabits per second.
  3. 5G will revolutionize networking, impact IoT, and change office connectivity by 2030.
0 implied HN points 23 Mar 20
  1. Symantec is abandoning many customers, leaving opportunities for competitors like CrowdStrike and Carbon Black.
  2. Symantec's past acquisitions, including Veritas, have not all been successful in terms of value.
  3. Private Equity may play a larger role in fueling growth in the cybersecurity industry.
0 implied HN points 26 Mar 20
  1. Defining success as an independent industry analyst can be challenging.
  2. Surviving financially during hard times is crucial for independent analysts.
  3. Diversifying income sources, like writing, speaking engagements, and consulting, is important for independent analysts during economic downturns.
0 implied HN points 01 May 20
  1. During quarantine, the author compiled 15 years of writings into a book for historical record.
  2. The author's writing has led to career-changing events and interactions with industry figures.
  3. The author's essays cover a wide range of topics, from cybersecurity to government proposals to industry critiques.
0 implied HN points 21 Sep 20
  1. The market size for cyber threat intelligence in 2020 is $517 million.
  2. Cyber threat intelligence is experiencing growth in the first half of 2020.
  3. The importance and relevance of cyber threat intelligence is increasing.
0 implied HN points 26 Jan 21
  1. In 2020, public cybersecurity companies had a strong performance.
  2. The shift to Work From Home due to COVID-19 led to increased spending on cybersecurity.
  3. Companies in the Identity and Access Management space saw good performance in 2020.
0 implied HN points 12 Apr 21
  1. There were only thirteen new cybersecurity vendors founded in 2020.
  2. The average age of cybersecurity vendors is 11 years.
  3. Some cybersecurity companies date back to the 1900s, with the oldest being founded in 1763.
0 implied HN points 22 Mar 21
  1. The year 2020 in cybersecurity was marked by significant events like COVID-19 and the SolarWinds breach.
  2. Digital transformation and zero trust network access were key trends in 2020, driving growth in companies like Zscaler, Netskope, and Perimeter 81.
  3. 2020 saw a substantial increase in funding for cybersecurity vendors, along with numerous mergers and acquisitions, showcasing a thriving industry despite the challenges.
0 implied HN points 05 Apr 21
  1. The cybersecurity industry can be broken down into 16 main categories that encompass a wide range of technologies and solutions.
  2. Despite challenges like the move to the cloud, new cybersecurity vendors continue to emerge each year.
  3. Analyzing market growth in the cybersecurity industry can be complex, with challenges in data collection and accurate estimation of revenue.
0 implied HN points 23 Sep 20
  1. Data collection for research can be flawed due to inconsistencies like self-reported information and outdated databases.
  2. Effective ways to find new vendors include tracking conference exhibitors, monitoring contacts' career shifts, and staying updated through social media and PR releases.
  3. Useful data points to collect about vendors include company details, funding, employee numbers, and website information, which can provide insights into their health and potential success.
0 implied HN points 28 Nov 21
  1. The United States historically dealt with piracy by deploying military force to deter attacks and pay tribute, similar to the current problem of Russian cybercrime.
  2. President Biden is preparing to respond to ransomware attacks, potentially targeting the perpetrators akin to deploying frigates against pirates.
  3. Paying ransoms for cyberattacks may temporarily solve the issue but ultimately encourages the spread of the problem, similar to historical examples of dealing with piracy.
0 implied HN points 03 Dec 21
  1. Solid state accelerometers are becoming ubiquitous and driving innovation in various technologies.
  2. The combination of control systems with sensors is fueling advancements in technology like robotics, drones, and self-driving vehicles.
  3. Policy makers need to prepare for a future where robotic systems replace simple labor jobs.
0 implied HN points 03 Jun 21
  1. The Executive Order focuses on improving cybersecurity for Federal agencies.
  2. It emphasizes the need to modernize government cybersecurity practices.
  3. The EO calls for standardizing responses to cybersecurity incidents and improving investigative capabilities.
0 implied HN points 02 Apr 21
  1. In 2020, the total new investment in cybersecurity was $10.7 billion.
  2. Some companies like MicroStrategy, OneTrust, and FireEye received major funding rounds in 2020.
  3. Despite the pandemic, many cybersecurity companies saw significant growth and secured large funding rounds.
0 implied HN points 10 Aug 20
  1. The EU is developing its own cloud platform called Gaia X.
  2. The goal is to create an alternative to US and Chinese cloud platforms.
  3. This initiative aims to enhance data sovereignty and privacy for European businesses.
0 implied HN points 30 Apr 21
  1. The publishing industry is a numbers game of backing multiple books to find a bestseller.
  2. Printing costs are kept lower by importing paper from China, but timing can be a challenge for topical books.
  3. Self-publishing with print-on-demand eliminates printing and fulfillment costs for authors.