This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
AI and Cybersecurity: How Rubrik’s Co-Founder Built a $1B+ ARR Platform While Joining the AI Revolution Lessons from Arvind Nithrakashyap, Co-Founder and CTO of Rubrik, on scaling cyber resilience platforms, building multiple product curves, and implementing AI across both products and operations.
For the digital health, AI infrastructure, cybersecurity, and developer tools companies in the IPO pipeline, the message is clear: founder leadership isn’t just acceptable in B2B—it’s the overwhelming norm and often a significant competitive advantage.
Risk Management: For companies like Rubrik working in sensitive areas like cybersecurity, ensuring AI recommendations are highly accurate and safe is crucial. Pricing Strategy : Consider whether AI features should be packaged as part of existing products or as separate offerings, based on how value scales with usage.
Today’s technology leaders play a more strategic role in establishing cybersecurity strategy for their organizations. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?”
Here’s a comprehensive overview of the major candidates: Company Founded CEO Sector Est. Revenue Valuation IPO Timeline Databricks 2013 Ali Ghodsi Data Analytics $2.4B $62B 2025-2026 Netskope 2012 Sanjay Beri Cybersecurity $487M $7.5B valuation—though leadership maintains no near-term IPO plans) Canva (design software, $48.7B
Unlimited budgets for “AI” and “cybersecurity” Long contract terms (3-7 years) High switching costs (security clearances) Less price sensitivity Actionable Takeaways For Current B2B Founders: Audit your “mission-critical” score – Would customers pay 2x your price?
She knew cybersecurity inside and out. .'” The lesson : Sometimes the most sophisticated marketing strategy is solving the most obvious problem first. How to Stand Out When You Know Nothing About Marketing Roz’s advantage wasn’t marketing expertise—it was domain expertise. Her strategy : Be different on purpose.
Cybersecurity and industrial/manufacturing are the two fastest growing categories. An analysis of their investment patterns since 2020 doesn’t just reveal the accelerator’s strategy—it provides a map to the entire startup ecosystem’s next chapter. Education & life sciences are right behind.
Speaker: Brian Chang, Managing Director of Warburg Pincus & Scott Schwan, Chief Product Officer of A-LIGN
Implement a cybersecurity infrastructure to sustain growth. In this webinar, you'll learn how to: Bridge the gap between product-market fit and go-to-market fit. Land marquee customers and build loyalty with them. Navigate roadblocks to scale and maintain focus on the long-term vision.
Identity/Security Software Faces Headwinds SailPoint’s underperformance reflects broader challenges in the cybersecurity software space, possibly due to market saturation or economic pressures on IT spending. These tend to have high switching costs and very durable recurring revenue models.
Look at: Logistics & Transportation Supply Chain Cybersecurity (outperforming AI since Q1 2022!) Even AI companies aren’t growing as fast as cybersecurity right now. It’s not where you might think.
Why wasn’t there more buzz? It’s a good one: $813m in ARR Growing 25%+ (financials are a bit complex) 114% NRR Very profitable (Rule of “44”) With the founder still CEO after 20 years!!
His background includes extensive experience in the cybersecurity space, beginning at Big Fix where he “fell in love with security” and at Duo Security. A Philadelphia native, Colin started his professional career as a Business Development Representative (BDR) 14 years ago and worked his way up to his current role as CRO.
Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster
In this webinar, Ronald Eddings, Cybersecurity Expert and Podcaster, will outline the interconnected relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.
The backdoor nobody knows about: Shared links Back in August, the cybersecurity podcast “Darknet Diaries” revealed a hidden danger: shared folders can become accidental gateways for hackers. With BetterCloud, IT can further secure its tech stack with full, granular, automated control of its organization’s Google and Microsoft shared files.
Christopher Doman As co-founder and CTO of Cado Security – a leading platform for cloud-native digital forensics and incident response – Christopher Doman is a seasoned cybersecurity professional making waves in the tech startup space. GET ISO 27001 COMPLIANT 90% FASTER 6.
Fortifying the cybersecurity fortress In today’s threat landscape, manual patching and vulnerability assessments are not only time-consuming but also inherently risky. Think of it as shifting from constantly putting out fires to proactively building a fire-resistant infrastructure.
Joselyn Goldfein , Managing Director at Zeta Venture Partners, which invests in AI and data infrastructure-focused startups from inception through seed stage And see everyone at 2025 SaaStr Annual, May 13-15 in SF Bay!!
The pandemic accelerated the shift towards remote work, and its impact on cybersecurity is undeniable. More cyberattacks are coming With data breaches and cyberattacks happening nearly every day, IT is even more justified to fortify their organizations and take real action.
Enhanced security : Providers offer security features that are usually more advanced than what can be built in-house without a lot of technical cybersecurity expertise including, for some examples, risk analysis, bot detection, MFA, and data encryption , protecting against unauthorized access.
In 2025, cybersecurity remains a critical focus for organizations worldwide. Organizations undergoing digital transformations need to carefully manage the associated risks, such as cybersecurity vulnerabilities, data privacy implications, and regulatory compliance in the digital landscape.
Tips from the expert Anthony Dombrowski Developer Relations Anthony Dombrowski is a product manager and developer advocate with expertise in developer experience, cybersecurity, and product strategy. Anthony Dombrowski is a product manager and developer advocate with expertise in developer experience, cybersecurity, and product strategy.
Still, UK SaaS companies are actively integrating AI: for example, cybersecurity firm Darktrace (London) uses deep learning for threat detection, and fintech/health SaaS are adding ChatGPT-like features. AI uptake in cybersecurity (Darktrace) and enterprise SaaS continues. DeepMind and others have moved R&D to the U.S.,
Successfully navigating these challenges requires a strategic approach, including investing in robust training programs, enhancing cybersecurity measures, and staying nimble to adapt to emerging trends.
Cybersecurity threats are at an all-time high, and businesses cannot afford to take risks when it comes to security. If youve been researching ways to protect your organization and strengthen your cybersecurity posture, youve likely come across penetration testing and vulnerability assessments.
A deep dive into Raaz Herzberg’s unconventional journey from product manager to CMO at $32B cybersecurity leader Wiz. CTF Challenges Wiz regularly releases complex Capture The Flag (CTF) challenges – essentially security riddles that teach hands-on cybersecurity skills. “There’s a lot of work that goes into it.
By integrating the DORA framework into our platform, we’re committed to helping your business boost its position as a trusted leader in the financial industry while adopting a proactive approach to cybersecurity and operational resilience.
Tips from the expert Anthony Dombrowski Developer Relations Anthony Dombrowski is a product manager and developer advocate with expertise in developer experience, cybersecurity, and product strategy. Anthony Dombrowski is a product manager and developer advocate with expertise in developer experience, cybersecurity, and product strategy.
Rudina Seseri, Managing Partner at Glasswing Ventures As founder and Managing Partner of Glasswing Ventures, Rudina leads investments in early-stage AI and Frontier Tech companies, with a particular focus on Enterprise and cybersecurity markets.
From governance and cybersecurity to data management and user support, the demands on IT departments are constantly escalating. Cybersecurity threats: The ever-evolving landscape of cyber threats necessitates robust security measures, demanding specialized expertise and constant vigilance from IT professionals.
If it wasnt clear before, these crises have further emphasized the growing urgency for businesses to recognize that robust cybersecurity measures are more critical than ever. GET COMPLIANT 90% FASTER Biggest Data Breaches of 2024 2024 witnessed some of the biggest and most impactful data breaches to date.
Our latest additions include the NIST Cybersecurity Framework (CSF) 2.0 , ISO 27032:2023 (Cybersecurity Guidelines) and TISAX for the automotive industry, with many more on the way. Additionally, our expert GRC team ensures a smooth experience every step of the way.
Your compliance journey may differ depending on whether or not you need to meet regulatory framework requirements like NIST Cybersecurity Framework and the General Data Protection Regulation ( GDPR ) of the European Union. Meet regulatory requirements Security compliance isn’t always optional.
The truth is, nothing in IT is free—not cloud storage, cybersecurity, licenses, infrastructure, or support. When IT appears “free,” it’s easy for departments to overconsume, underoptimize, and overlook the true cost of services. The result? Overspending, budgeting headaches, and broken trust between departments and Shared Services teams.
Product Manager At-Bay (20212023): Defined and executed the roadmap for a broker platform and end-customer portal at a Series D cybersecurity/insurtech firm. Collaborates cross-functionally with design, engineering, marketing, and sales to deliver scalable solutions.
Related content: Read our guide to user management Tips from the expert: Anthony Dombrowski Developer Relations Anthony Dombrowski is a product manager and developer advocate with expertise in developer experience, cybersecurity, and product strategy.
When it comes to cybersecurity, pen tests are definitely one of the cooler kids on the block. Get everything you need to ace your pen test report with Scytale , knowing that you’ve successfully tested and remediated every inch of your cybersecurity. However, you need the correct documentation and critical reports.
Related content: Read our guide to passwordless authentication Tips from the expert Anthony Dombrowski Developer Relations Anthony Dombrowski is a product manager and developer advocate with expertise in developer experience, cybersecurity, and product strategy.
CyberSecurity Remains a High Growth Segment, With Zero Downturns You may have noticed Wiz’s $32 Billion acquisition by Google. CIOs can’t risk big breaches, so more and more IT budget just keeps going to cybersecurity. But still — breathtaking. #2. Rubrik’s 39% growth at $1.1 Especially as attacks surge. #3.
So, for instance, uh, Jeff Williams, who’s an operating partner here at BCB, he’s been a CRO at multiple cybersecurity startups. Uh, and maybe more, uh, a couple of years beyond that.
The demand for cybersecurity products that work remains unbowed! 114 $1m+ ARR Customers Cybersecurity often swings big here. No “Downturn” or Macro Impacts in Cybersecurity, But Deals Take Longer to Process Cybersecurity demand is stronger than ever. Most likely because it’s not cash flow positive yet.
“So we're seeing some slowdown in certain sectors and, frankly, acceleration in others, things like low-code, no-code environments, productivity, cybersecurity to protect the enterprise …. Some sectors aren’t seeing any slowdown, like cybersecurity, productivity and “no code” This is also what I’m seeing.
As each day brings another story about cybersecurity threats like DDoS attacks and phishing, ecommerce security is getting more important than ever. The post The Complete Guide to Ecommerce Security appeared first on The Daily Egg.
We organize all of the trending information in your field so you don't have to. Join 80,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content