Skip to content

Cybersecurity Threat Landscape

Why This Page Exists

Before evaluating products, segments, and vendors, we need to understand the problem they exist to solve. This page provides the empirical foundation: what is actually happening in the threat landscape, how much it costs, and --- critically --- why billions of dollars in mature security technology still fails to prevent breaches. The answers here inform every segment analysis and opportunity score in this research.


1. The State of Play

The cybersecurity threat landscape in 2024--2025 is defined by a paradox: incident volume is plateauing, but impact per incident is escalating.

Metric 2023 2024 Trend
U.S. data compromises 3,202 3,158 -1% (ITRC)
Accounts breached globally ~730M ~5.5B +653% (Surfshark)
Victim notices (U.S.) 419M 1.73B +312% (ITRC)
Mega-breaches (100M+ records) 2 6 +200%
Mean time to identify + contain 277 days 258 days -7% (IBM)
Median dwell time (Mandiant) 10 days ~11 days Flat (Mandiant M-Trends)

The Mega-Breach Era

In 2024, six individual breaches each exposed more than 100 million records. Nearly 180 accounts were compromised every second throughout the year. The raw number of incidents matters less than the blast radius per event --- a structural shift driven by cloud concentration, interconnected supply chains, and identity-based attacks that unlock entire environments at once.

The first half of 2025 tracked at 55% of 2024's full-year compromise count (1,732 incidents), suggesting a pace roughly comparable to 2024 but with fewer mega-breaches driving the totals (Secureframe).


2. Financial Impact

Global Cost of Cybercrime

Estimates vary widely depending on methodology:

Source Scope 2024 Estimate 2025 Estimate 2026 Projection
Cybersecurity Ventures Holistic (all damages) $9.5T $10.5T $11.9T
Statista / conservative models Direct + indirect losses -- $1.2--1.5T --

Knowledge Gap

The order-of-magnitude gap between "conservative" and "holistic" cybercrime cost estimates ($1.5T vs. $10.5T) reflects fundamentally different measurement approaches. The Cybersecurity Ventures figure includes opportunity costs, IP theft, productivity loss, and reputational damage that are difficult to verify independently. We cite both but recommend using the conservative range for financial modeling and the holistic figure for framing the macro problem.

Average Cost Per Breach (IBM)

IBM's Cost of a Data Breach Report remains the industry benchmark:

Year Global Average U.S. Average Healthcare (Highest)
2023 $4.45M $9.48M $10.93M
2024 $4.88M (+10%) $9.36M $9.77M
2025 $4.44M (-9%) $10.22M (+9%) $7.42M

The 2025 global decline is the first in five years, driven largely by AI-accelerated detection and response. Organizations using security AI extensively saved $1.9M per breach and shortened the breach lifecycle by 80 days. However, organizations with high levels of "shadow AI" (unapproved AI tools) saw an extra $670K added to breach costs (IBM 2025).

Ransomware Economics

Metric 2023 2024 2025 (H1) Source
Total ransomware payments $1.1B $813M (-35%) Declining Chainalysis
% of victims paying 62.8% 28% Declining further Coveware
Median ransom payment -- $2M $1M (-50%) Sophos/Coveware

Ransom Payment Paradox

Fewer victims are paying (payment rates dropped from 79% in 2022 to 28% in 2025), but attackers are compensating by increasing demand sizes and targeting larger organizations. Manufacturing firms remain the most likely to pay (62%), while financial services faces the highest median demands ($2M). The economic model is shifting from volume to precision.

Regulatory Fines & Penalties

GDPR enforcement has reached cumulative fines of EUR 5.65 billion across 2,245 recorded penalties as of March 2025 (GDPR Enforcement Tracker):

  • Meta: EUR 1.2B (largest single GDPR fine, data transfers)
  • TikTok: EUR 530M (May 2025, data transfers to China)
  • LinkedIn: EUR 310M (October 2024, behavioral targeting)
  • Uber: EUR 290M (January 2024, data transfers)

SEC cyber disclosure rules (effective December 2023) now require material incident reporting within four business days, adding U.S. enforcement pressure atop GDPR.

Stock Price Impact

Research analyzing 776 cyber incidents (2012--2022) found firms lose an average of $309M in market value on the day a cyber-attack is disclosed (Springer). Large, salient breaches typically cause a 5--9% decline in reputational intangible capital (ISTARI).

Cyber Insurance Market

Metric 2024 2025 Source
Global premium volume $15.3B $16.3B Munich Re / Industry
Claims filed ~50,000 (+40% YoY) -- NAIC
Average premium change -6% (Q3 2024) -7% (Q1 2025) Marsh
2026 premium forecast -- +15--20% S&P Global

The market has been buyer-friendly through 2024--2025 as capacity expanded, but S&P forecasts a 15--20% premium increase in 2026 as loss ratios tighten.

{
  "$schema": "https://vega.github.io/schema/vega-lite/v5.json",
  "description": "Cybersecurity Cost Trends (2020-2025)",
  "width": 500,
  "height": 300,
  "title": {"text": "Cybersecurity Cost Trends (2020-2025)", "fontSize": 16, "color": "#1B1F3B"},
  "config": {"background": "transparent", "axis": {"labelColor": "#3D4166", "titleColor": "#1B1F3B", "gridColor": "#e5e8ee"}, "legend": {"labelColor": "#3D4166", "titleColor": "#1B1F3B"}},
  "layer": [
    {
      "mark": {"type": "bar", "color": "#00C9A0", "opacity": 0.8},
      "data": {"values": [
        {"year": "2020", "value": 3.86}, {"year": "2021", "value": 4.24}, {"year": "2022", "value": 4.35},
        {"year": "2023", "value": 4.45}, {"year": "2024", "value": 4.88}, {"year": "2025", "value": 4.44}
      ]},
      "encoding": {
        "x": {"field": "year", "type": "nominal", "axis": {"title": null}},
        "y": {"field": "value", "type": "quantitative", "axis": {"title": "USD (Millions)"}, "scale": {"domain": [0, 12]}},
        "tooltip": [{"field": "year"}, {"field": "value", "title": "Avg Breach Cost ($M)"}]
      }
    },
    {
      "mark": {"type": "line", "color": "#008F72", "strokeWidth": 2, "point": {"color": "#008F72", "size": 60}},
      "data": {"values": [
        {"year": "2020", "value": 8.64}, {"year": "2021", "value": 9.05}, {"year": "2022", "value": 9.44},
        {"year": "2023", "value": 9.48}, {"year": "2024", "value": 9.36}, {"year": "2025", "value": 10.22}
      ]},
      "encoding": {
        "x": {"field": "year", "type": "nominal"},
        "y": {"field": "value", "type": "quantitative"},
        "tooltip": [{"field": "year"}, {"field": "value", "title": "U.S. Avg Breach Cost ($M)"}]
      }
    }
  ]
}

3. Attack Vector Analysis

Top Attack Vectors

Phishing overtook stolen credentials as the most common initial attack vector in 2025:

Attack Vector % of Breaches (2025) Avg Cost Trend Source
Phishing 16% $4.8M Up (was #2 in 2024) IBM 2025
Stolen/compromised credentials 15% $4.8M Down (was #1) IBM 2025
Cloud misconfiguration 12% $4.0M Stable IBM 2025
Business email compromise 10% $4.9M Up IBM 2025
Vulnerability exploitation 9% $4.6M Up (zero-days) IBM 2025
Supply chain compromise 7% $4.7M Up significantly IBM 2025
Malicious insider 6% $4.9M Stable IBM 2025

Knowledge Gap

IBM's 2025 percentages above are approximations based on publicly available summaries. Exact vector breakdown percentages shift between report editions; the directional ranking (phishing > credentials > cloud misconfig) is well-established.

Attack Vector Distribution

{
  "$schema": "https://vega.github.io/schema/vega-lite/v5.json",
  "description": "Initial Attack Vectors (2025, approximate)",
  "width": 400,
  "height": 400,
  "title": {"text": "Initial Attack Vectors (2025, approximate)", "fontSize": 16, "color": "#1B1F3B"},
  "config": {"background": "transparent", "legend": {"labelColor": "#3D4166", "titleColor": "#1B1F3B"}},
  "mark": {"type": "arc", "innerRadius": 50},
  "data": {"values": [
    {"category": "Phishing", "value": 16},
    {"category": "Stolen Credentials", "value": 15},
    {"category": "Cloud Misconfiguration", "value": 12},
    {"category": "Business Email Compromise", "value": 10},
    {"category": "Vulnerability Exploitation", "value": 9},
    {"category": "Supply Chain", "value": 7},
    {"category": "Malicious Insider", "value": 6},
    {"category": "Other", "value": 25}
  ]},
  "encoding": {
    "theta": {"field": "value", "type": "quantitative"},
    "color": {"field": "category", "type": "nominal", "scale": {"range": ["#00C9A0", "#008F72", "#00E8BB", "#0B1929", "#14283F", "#1F3751", "#3D4166", "#6B6F8D"]}, "legend": {"title": null}},
    "tooltip": [{"field": "category"}, {"field": "value"}]
  }
}

Detection & Response Timelines

Metric 2023 2024 2025 Source
Mean time to identify + contain 277 days 258 days 241 days IBM
Median dwell time (all attacks) 10 days 10 days 8--11 days Mandiant / Sophos
Median dwell time (ransomware) 5 days 5 days 5 days Sophos
Breach lifecycle with AI/automation -- -- -80 days vs. without IBM 2025

Detection times are improving --- the 241-day mean in 2025 is a nine-year low --- but ransomware dwell time has compressed to 5 days, meaning defenders have less than a week from initial compromise to full encryption.

Attack Sophistication Evolution

Tier Sophistication Dwell Time Example
Commodity Low --- off-the-shelf RaaS kits Hours to days Phobos, Dharma affiliates
Organized Crime Medium --- custom tooling, RaaS platforms Days to weeks Cl0p, RansomHub, Akira
Nation-State High --- living-off-the-land, zero-days Months to years Volt Typhoon, APT29
AI-Augmented Variable --- AI scales lower tiers upward Accelerating Deepfake phishing, automated recon

AI-Powered Attacks

AI Is Reshaping the Attacker's Toolkit

  • Phishing attacks linked to generative AI surged 1,265% since the launch of ChatGPT (ZeroThreat)
  • 62% of organizations experienced a deepfake attempt in the past 12 months (Gartner)
  • A single deepfake-CFO video call led to a $25.6M fraudulent payment (CNN/DeepStrike)
  • Deepfake-as-a-Service platforms became widely available in 2025, democratizing voice/video impersonation (Cyble)
  • 97% of cybersecurity professionals fear an AI-driven incident; 93% expect daily AI attacks within a year (Cobalt.io)
  • By mid-2026, fully autonomous phishing systems capable of scraping organizational data and generating personalized attacks at scale are expected (SecureTrust)

4. The Maturity Paradox: Why Compromises Still Occur

The Central Question

The cybersecurity industry generates over $290 billion in annual revenue. Enterprises deploy an average of 45--85 security tools. Firewalls, endpoint protection, SIEM, IAM, and email security are mature, well-understood categories with decades of development. Why do breaches keep happening?

The answer is not that the technology does not work. It is that the operating model is broken. The following ten factors explain why mature technology fails to produce mature security outcomes.

4.1 Tool Sprawl Without Integration

Organizations deploy 45 to 85 security tools on average (ISACA, The Sequence), and 65% say they have too many. Worse, 53% report their tools cannot be integrated with each other. Each tool generates its own alerts, its own dashboards, its own data model. The result: defenders drown in fragmented telemetry while attackers move laterally through the gaps between products.

Market Gap: Integration Layer

Despite the platformization trend, most enterprises still run heterogeneous stacks. Products that provide cross-vendor normalization, correlation, and orchestration --- without requiring rip-and-replace --- address a real and persistent failure mode.

4.2 Alert Fatigue and SOC Burnout

The average SOC receives 4,484 to 10,000+ alerts per day. False positive rates in enterprise SOCs frequently exceed 50%, with some organizations reporting 80%+ (CyberDefenders, Dropzone AI). The downstream effect is devastating:

  • 71% of SOC analysts report burnout
  • 70% of analysts with <5 years experience leave within three years
  • 90% of SOCs are overwhelmed by backlogs and false positives
  • 88% report alert volume has increased, with 46% seeing a 25%+ spike in the past year

Human Bottleneck

Security tools are generating more signal than humans can process. The gap between "alerts generated" and "alerts meaningfully investigated" represents both the core SOC problem and one of the largest product opportunities in the market (see Underserved Areas).

4.3 The Human Factor

Social engineering bypasses technology entirely. Phishing is the #1 attack vector (16% of breaches) not because email filters fail --- they catch most malicious messages --- but because the ones that get through target human psychology, not technical vulnerabilities. BEC attacks cost an average of $4.9M per incident, the highest of any vector.

4.4 Configuration Drift and Complexity

A tool is only as good as its configuration. As environments scale and change, security tools drift from their intended state. Policies grow stale. Exceptions accumulate. New cloud services deploy without matching security controls. The tool was purchased; the outcome was not achieved.

4.5 Identity Is the New Perimeter

Credential-based attacks (stolen creds + phishing combined = 31% of breaches) render network-perimeter security largely irrelevant. Once an attacker has valid credentials, they are indistinguishable from a legitimate user. Multi-factor authentication helps but is increasingly bypassed by:

  • Adversary-in-the-middle (AiTM) phishing kits
  • MFA fatigue / push bombing
  • SIM swapping and SS7 attacks
  • Session token theft

Market Gap: Post-Authentication Behavioral Analysis

Most identity products focus on the authentication event. The gap is in continuous behavioral validation after login --- detecting when legitimate credentials are being used illegitimately. This maps directly to the Identity & Access segment analysis in this research.

4.6 Supply Chain Blindspots

Organizations are only as secure as their weakest vendor. The SolarWinds (2020), Kaseya (2021), MOVEit (2023), and Cleo (2025) incidents demonstrated that a single compromised software supplier can cascade across thousands of downstream victims. Supply chain attacks now account for 7% of breaches and that number is rising.

4.7 Legacy Systems and Technical Debt

You cannot patch what you cannot update. Critical infrastructure, healthcare systems, and manufacturing environments run end-of-life software that cannot receive security updates. OT environments in particular are 5--10 years behind IT security maturity, with protocols designed decades ago for isolated networks now exposed through IT/OT convergence.

4.8 Speed Asymmetry

Phase Attacker Timeline Defender Timeline
Initial access Minutes (automated scanning) --
Lateral movement Hours Days to detect
Data exfiltration Hours to days Weeks to identify
Full remediation -- Months
Breach lifecycle (mean) -- 241 days (IBM 2025)

Ransomware operators now move from initial access to encryption in as little as 5 days (median). Defenders operating on weekly patch cycles and monthly vulnerability scans are structurally outpaced.

4.9 Economic Incentives Favor Attackers

Cybercrime is a high-reward, low-risk enterprise:

  • Ransomware-as-a-Service kits cost as little as $40/month on dark web marketplaces
  • Initial access to compromised networks sells for $500--$5,000 via Initial Access Brokers
  • Prosecution rates for cybercriminals remain vanishingly low, especially across jurisdictions
  • A single successful ransomware attack can yield $1M+ (median 2025 payment)

Implication

Any defensive approach that does not account for the economic asymmetry --- where attack ROI dramatically exceeds defense ROI --- will remain structurally disadvantaged. Products that increase attacker cost (deception technology, moving target defense) or reduce defender cost (AI-driven automation) are addressing the root incentive problem.

4.10 Compliance Does Not Equal Security

Checkbox compliance cultures create false confidence. Organizations that pass audits --- SOC 2, ISO 27001, PCI DSS --- may still have critical security gaps because:

  • Compliance frameworks lag behind threat evolution by 2--5 years
  • Audits test documentation and process, not adversarial resilience
  • "Compliant" configurations may still be vulnerable to novel attack techniques
  • Compliance scope excludes entire segments of the environment (shadow IT, SaaS sprawl, AI tools)

The Defender's Dilemma

Attacker AdvantageDefender's BurdenMust find ONE way inAutomated scanningBuys access from IABs for $500Social engineers one employeeExploits one unpatched CVECompromises one vendorMust defend EVERYTHING10,000+ endpoints500+ SaaS applications100,000+ identities1,000+ cloud workloads45-85 security tools4,484+ daily alertsUnderstaffed SOC\n(53% report understaffing) Asymmetric advantage

5. Attack Surface Expansion

The attack surface has expanded dramatically across six vectors simultaneously:

Growth Vectors

Vector Pre-2020 2025 Growth Driver
Cloud workloads Early adoption 94% of enterprises use cloud Multi-cloud + AI workloads
IoT/OT devices Isolated networks 820,000 IoT attacks/day IT/OT convergence
Remote endpoints Office-centric Hybrid/remote workforce COVID-era shift persisting
APIs Dozens per org Hundreds, changing weekly API-first architecture
AI/ML systems Research phase 99% report AI system attacks Enterprise AI adoption
Software supply chain Limited visibility Thousands of dependencies per app Open-source + SaaS

OT/IoT Convergence

OT Under Siege

OT/IoT attacks surged dramatically in 2025:

  • 84% increase in attacks using OT protocols (Modbus, Ethernet/IP, BACnet) (Forescout)
  • IoT attacks rose from 16% to 19% of all device-targeting attacks
  • IP cameras and NVRs remain the most-targeted IoT devices
  • 24% of attacks now originate from hosting/cloud providers, up from 10% (Palo Alto Networks)

Attack Surface Expansion Over Time

2010s2020-20222023-2026On-prem serversOffice endpointsEmailWeb appsCloud IaaS/PaaS/SaaSRemote workforceVPN/ZTNAContainers/K8sIoT devicesAI/ML pipelinesAI agentsLLM APIsOT/ICS networksSoftware supply chainNon-human identitiesEdge computing

6. Threat Actor Landscape

Deep-Dive Available

This section provides a summary of the threat actor landscape. For exhaustive analysis — including full group catalogs, TTP breakdowns, tooling arsenals, campaign histories, and market implications — see the dedicated Threat Actors section.

Nation-State Actors

Actor Attribution Primary Objective Notable Activity (2024--2026)
Volt Typhoon (China) PRC / MSS Pre-positioning in critical infrastructure Still embedded in U.S. electric, oil, gas, telecom utilities through 2025; targeting OT systems; interacting with OT devices and stealing sensor data
Salt Typhoon (China) PRC / MSS Telecom espionage Compromised major U.S. telecom providers; accessed call metadata and wiretap systems
APT29 / Cozy Bear (Russia) SVR Espionage, cloud targeting Microsoft, SolarWinds follow-on; persistent targeting of cloud identity systems
Sandworm (Russia) GRU Destructive attacks, critical infrastructure Continued targeting of Ukrainian infrastructure; wiper malware evolution
Lazarus Group (North Korea) RGB Financial theft, cryptocurrency Major crypto exchange thefts; funding state weapons programs
APT33/35 (Iran) IRGC / MOIS Espionage, destructive (Israel focus) Opportunistic exploitation of edge devices; wiper deployments

Pre-Positioning for Conflict

Volt Typhoon is not conducting espionage --- it is pre-positioning destructive capabilities inside U.S. critical infrastructure to enable denial-of-service and sabotage during a potential geopolitical crisis (e.g., Taiwan conflict). CISA assesses the group is targeting electric utilities, water systems, telecom, and transportation hubs. Dragos confirms the group remained active through 2025 and continues mapping U.S. and NATO infrastructure.

Ransomware Ecosystem (2025--2026)

Group Status Notable TTPs
Cl0p Most prolific in Q1 2025 Zero-day exploitation of file transfer tools (MOVEit, Cleo); mass data exfiltration without encryption
RansomHub Active, absorbed ALPHV affiliates Inherited BlackCat operators; aggressive affiliate recruitment
Akira Active, top 5 globally Cross-platform (Linux + Windows); targeting SMBs
Qilin Active, rising Healthcare and education targeting
LockBit Resurfaced September 2025 post-law-enforcement takedown Threatened critical infrastructure including nuclear facilities
ALPHV/BlackCat Defunct since March 2024 Exit-scammed affiliates; operators migrated to RansomHub

Hydra Effect

Law enforcement takedowns of LockBit and ALPHV/BlackCat did not reduce ransomware volume --- they caused an explosion of smaller, more agile groups. Q1 2025 saw a 126% year-over-year increase in public extortion cases as affiliates scattered across new RaaS platforms. The ransomware ecosystem is more fragmented and harder to track than ever.

Other Threat Actors

  • Initial Access Brokers (IABs): Specialized operators who compromise networks and sell access to ransomware gangs for $500--$5,000+. They are the "supply chain" of the ransomware economy, creating a separation between intrusion and monetization that complicates attribution and takedowns.

  • Hacktivism resurgence: Geopolitically motivated groups (pro-Russia, pro-Palestine, others) conduct DDoS, defacement, and data leak operations. Impact is typically reputational rather than financial, but blurs the line between activism and state-sponsored operations.

  • Insider threats: Remain responsible for ~6% of breaches at the highest per-incident cost ($4.9M). Increasingly includes "insider-as-a-service" recruitment by external threat actors targeting disgruntled employees.

  • AI-augmented attackers: Not a separate actor category but a force multiplier across all categories. AI lowers the skill barrier, increases attack personalization, and accelerates every phase of the attack lifecycle.


7. The Defender's Reality

Workforce Shortage

Metric Value Source
Global cybersecurity workforce 5.5M professionals ISC2 2025
Estimated demand 10.2M professionals ISC2 2025
Workforce gap 4.8M unfilled positions ISC2 2024
Teams reporting critical skills gaps 59% (up from 44% prior year) ISC2 2025
Organizations reporting staffing-related security incidents 88% ISC2 2025
CISOs reporting adequate staffing 11% Hitch Partners 2025
Teams "stretched thin" or "severely understaffed" 53% Hitch Partners 2025

Skills > Headcount

ISC2's 2025 study marks a strategic pivot: the industry now frames the problem as a skills gap rather than a headcount gap. 59% of teams report critical skills shortfalls, particularly in cloud security, AI/ML security, OT security, and threat intelligence. Simply hiring more analysts does not solve the problem if they lack specialized skills.

Budget Pressures and CISO Tenure

  • Average CISO tenure: 18--26 months (vs. 4.9 years for typical C-suite) --- though some surveys report improvement to ~39 months (Hitch Partners 2025)
  • 1 in 4 CISOs are considering leaving the profession
  • Security budget as % of IT spend fell from 11.9% to 10.9% in 2025, breaking a five-year upward trend (IANS Research)
  • Board alignment declining: only 64% of CISOs feel the board understands their cybersecurity view, down from 84% the prior year (Proofpoint 2025 Voice of the CISO)

SOC Burnout

  • 71% of SOC analysts report burnout (Prophet Security)
  • 70% of analysts with <5 years experience leave within 3 years
  • 1 in 3 cybersecurity professionals considering leaving the field entirely
  • Average SOC analyst spends ~32 minutes per alert investigation; at 4,484 alerts/day, the math is impossible without automation

Automation Imperative

The SOC staffing math is fundamentally broken. 4,484+ daily alerts x 32 minutes per investigation = 2,390 analyst-hours per day needed, for a team that typically has 5--15 analysts working 8-hour shifts. This is why AI-driven triage, automated investigation, and agentic SOC tools represent one of the highest-impact product opportunities in the market. See the SIEM & SOAR segment and Emerging Tech analyses.


8. Implications for This Research

Threat-to-Segment Mapping

The threat landscape maps to market segments in predictable ways, but the mismatch between where threats land and where products concentrate reveals the most important investment signals:

Threat Reality Most Relevant Segment(s) Product Coverage Gap?
Phishing (#1 vector) Email Security, Security Awareness Mature, but AI-phishing outpacing filters Moderate
Credential attacks (#2 vector) Identity & Access Strong on authentication; weak on post-auth behavior Yes
Cloud misconfiguration (#3) Cloud Security (CNAPP/CSPM) Improving rapidly Moderate
Ransomware (economic model) EDR/XDR, MDR, Backup/Recovery Detection good; recovery/resilience underinvested Yes
Supply chain attacks Application Security, Vuln/ASM SBOM adoption growing; runtime supply chain monitoring weak Yes
OT/IoT attacks (+84% in OT protocols) OT/IoT Security 5--10 years behind IT maturity Critical
AI-powered attacks Cross-cutting Defensive AI emerging; AI-specific attack detection nascent Critical
Insider threats (highest cost) Identity, Data Security, UEBA Fragmented across products; no unified solution Yes
Alert fatigue / SOC burnout SIEM & SOAR, MDR AI SOC tools emerging; market early-stage Yes
Nation-state pre-positioning Threat Intel, OT Security, NDR Indicators shared; proactive defense limited Yes

Where Products Are Not Addressing Real Problems

The largest gaps between threat reality and product coverage exist in:

  1. OT/IoT security --- attack volumes surging, product maturity lagging years behind IT
  2. AI attack detection --- 97% of security teams fear AI incidents, but dedicated AI-attack-detection products barely exist
  3. Post-authentication identity monitoring --- credentials are the #2 vector, but most identity products stop at the login event
  4. SOC automation --- the alert-to-analyst ratio is physically impossible without AI-driven triage
  5. Supply chain runtime monitoring --- SBOMs track what is deployed, but few products detect supply chain compromise in real-time

Where Better Solutions Could Make a Difference

The highest-impact product opportunities align with the root causes identified in the Maturity Paradox:

  • Cross-vendor integration and orchestration --- addressing tool sprawl (Section 4.1)
  • AI-native SOC triage --- addressing alert fatigue (Section 4.2)
  • Continuous identity behavioral analysis --- addressing credential attacks (Section 4.5)
  • OT-native security platforms --- addressing legacy/convergence gaps (Sections 4.7, 5)
  • Attacker-cost-increasing technologies --- addressing economic asymmetry (Section 4.9)

For detailed scoring of these and 95 other market gaps, see the Underserved Areas & Market Gaps analysis.


9. Sources & Further Reading

Primary Reports

Threat Actor Intelligence

Market & Economic Data

Defender Challenges


Page last updated: March 2026. Data sourced from 2024--2026 reports as cited inline. For methodology details, see Methodology.

Glossary

This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.

A

Term Definition
ACL Access Control List — rules determining which users/systems can access resources
APT Advanced Persistent Threat — a prolonged, targeted cyberattack where an intruder gains and maintains unauthorized access
ASM Attack Surface Management — continuous discovery, inventory, and risk assessment of an organization's external-facing assets
ASPM Application Security Posture Management — unified visibility and risk management across the application lifecycle
AV Antivirus — software designed to detect, prevent, and remove malware

B

Term Definition
BAS Breach and Attack Simulation — automated tools that simulate real-world attacks to test security controls
BEC Business Email Compromise — a social-engineering attack targeting employees with access to company finances or data

C

Term Definition
C2 Command and Control — infrastructure used by attackers to communicate with compromised systems
CASB Cloud Access Security Broker — a security policy enforcement point between cloud consumers and providers
CCPA California Consumer Privacy Act — California state law granting consumers rights over their personal data
CIAM Customer Identity and Access Management — managing and securing external customer identities and authentication
CIEM Cloud Infrastructure Entitlement Management — managing identities and privileges in cloud environments
CTEM Continuous Threat Exposure Management — a program for continuously assessing and prioritizing threat exposures
CNAPP Cloud-Native Application Protection Platform — integrated security for cloud-native applications across the full lifecycle
CSPM Cloud Security Posture Management — continuous monitoring of cloud infrastructure for misconfigurations and compliance risks
CWPP Cloud Workload Protection Platform — security for workloads running in cloud environments (VMs, containers, serverless)
CVE Common Vulnerabilities and Exposures — a standardized identifier for publicly known cybersecurity vulnerabilities

D

Term Definition
DAST Dynamic Application Security Testing — testing a running application for vulnerabilities by simulating attacks
DCS Distributed Control System — a control system for managing industrial processes across multiple locations
DLP Data Loss Prevention — tools and processes to prevent unauthorized data exfiltration or leakage
DORA Digital Operational Resilience Act — EU regulation on ICT risk management for financial entities
DSPM Data Security Posture Management — discovering, classifying, and protecting sensitive data across cloud environments

E

Term Definition
EASM External Attack Surface Management — discovering and monitoring internet-facing assets for exposures
EDR Endpoint Detection and Response — tools that monitor endpoints for threats and provide investigation and response capabilities
EPP Endpoint Protection Platform — integrated endpoint security combining prevention, detection, and response

F/G

Term Definition
FAIR Factor Analysis of Information Risk — a quantitative model for understanding, analyzing, and measuring information risk
GRC Governance, Risk, and Compliance — integrated framework for aligning IT with business goals, managing risk, and meeting regulations
GDPR General Data Protection Regulation — EU regulation on data protection and privacy for individuals

H

Term Definition
HIPAA Health Insurance Portability and Accountability Act — US law governing the privacy and security of health information

I

Term Definition
IAB Initial Access Broker — specialized cybercriminals who compromise networks and sell access to ransomware operators and other buyers
IAM Identity and Access Management — framework for managing digital identities and controlling access to resources
ICS Industrial Control System — control systems used in industrial production and critical infrastructure
IDS Intrusion Detection System — a system that monitors network traffic for suspicious activity and alerts
ITDR Identity Threat Detection and Response — detecting and responding to identity-based attacks and compromises
IoT Internet of Things — network of physical devices embedded with sensors, software, and connectivity
IPS Intrusion Prevention System — a system that monitors and actively blocks detected threats in network traffic

L

Term Definition
LOTL Living Off the Land — attack technique using legitimate, pre-installed system tools and binaries rather than custom malware to evade detection

M

Term Definition
MaaS Malware-as-a-Service — cybercrime business model where malware developers sell or rent their tools to other criminals
MDR Managed Detection and Response — outsourced security service providing 24/7 threat monitoring, detection, and response
MITRE ATT&CK MITRE Adversarial Tactics, Techniques, and Common Knowledge — a knowledge base of adversary behaviors and techniques
MSSP Managed Security Service Provider — a third-party provider offering outsourced monitoring and management of security devices
MFA Multi-Factor Authentication — requiring two or more verification factors to gain access to a resource

N

Term Definition
NDR Network Detection and Response — detecting and responding to threats by analyzing network traffic patterns
NERC CIP North American Electric Reliability Corporation Critical Infrastructure Protection — security standards for the electric grid
NGAV Next-Generation Antivirus — advanced antivirus using behavioral analysis, AI, and machine learning beyond signature-based detection
NIS2 Network and Information Systems Directive 2 — updated EU directive on cybersecurity for essential and important entities
NIST CSF National Institute of Standards and Technology Cybersecurity Framework — a voluntary framework for managing cybersecurity risk

O

Term Definition
OT Operational Technology — hardware and software that monitors and controls physical devices and processes
OWASP Open Worldwide Application Security Project — a nonprofit focused on improving software security through open-source projects and guidance

P

Term Definition
PAM Privileged Access Management — securing, managing, and monitoring privileged accounts and access
PCI DSS Payment Card Industry Data Security Standard — security standards for organizations that handle credit card data
PII Personally Identifiable Information — any data that could identify a specific individual
PLC Programmable Logic Controller — an industrial computer used to control manufacturing processes

R

Term Definition
RaaS Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits
RGB Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations

S

Term Definition
SASE Secure Access Service Edge — converged network and security-as-a-service architecture delivered from the cloud
SAST Static Application Security Testing — analyzing source code for vulnerabilities without executing the application
SBOM Software Bill of Materials — a formal inventory of components, libraries, and dependencies in a software product
SCA Software Composition Analysis — identifying open-source components and known vulnerabilities in a codebase
SCADA Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely
SD-WAN Software-Defined Wide Area Network — a virtual WAN architecture that simplifies branch networking and optimizes traffic
SEG Secure Email Gateway — a solution that filters inbound and outbound email to block threats and enforce policies
SIEM Security Information and Event Management — aggregating and analyzing log data for threat detection and compliance
SOAR Security Orchestration, Automation, and Response — tools that automate and coordinate security operations workflows
SOC Security Operations Center — a centralized team and facility for monitoring, detecting, and responding to security incidents
SOX Sarbanes-Oxley Act — US law mandating financial reporting and internal control requirements for public companies
SSE Security Service Edge — the security component of SASE, delivering SWG, CASB, and ZTNA as cloud services
SWG Secure Web Gateway — a solution that filters web traffic to enforce security policies and block threats

T

Term Definition
TAM Total Addressable Market — the total revenue opportunity available for a product or service
TCO Total Cost of Ownership — the complete cost of acquiring, deploying, and operating a solution over its lifetime
TIP Threat Intelligence Platform — a system for aggregating, correlating, and operationalizing threat intelligence data
TLS Transport Layer Security — a cryptographic protocol that provides secure communication over a network
TTP Tactics, Techniques, and Procedures — the patterns of behavior and methods used by threat actors to conduct cyber operations

V

Term Definition
VM Vulnerability Management — the ongoing process of identifying, evaluating, treating, and reporting security vulnerabilities

X

Term Definition
XDR Extended Detection and Response — unified threat detection and response across endpoints, network, cloud, and email

Z

Term Definition
ZTNA Zero Trust Network Access — a security model that grants access based on identity verification and least-privilege principles