January 24, 2017 By Douglas Bonderud 2 min read

Cybersecurity is a hot topic both in the U.S. and abroad. With data breaches on the rise and skilled security professionals in short supply, the market seems ripe for startup developments.

But as noted by CB Insights, slowing investment numbers across the globe suggested that 2016 had cooled compared to a red hot 2015. As it turns out, that’s only part of the story. Along with the U.S., Israeli cybersecurity hit a new high mark in 2016.

Israeli Cybersecurity Market Hot in 2016

According to TechCrunch, the Israeli security market is taking on all comers, with 83 newly founded cybersecurity startups through 2016 compared to 81 in 2015. Also of note, there were 72 investment rounds worth $689 million in 2016, compared to 62 rounds at $560 million during the previous year. The Israeli cybersecurity space also underwent a changing of the guard, as industry newcomers, not grizzled security veterans, dominated the market in 2016.

Some investment categories remained consistent across 2015 and 2016, such as mobile security, risk management and SCADA security. However, some emerging areas of risk, such as the Internet of Things (IoT), drone security and cyber insurance, also attracted capital in 2016. While total worldwide investment was down last year, the U.S. and several other markets remained strong, bolstered in part by increased cybersecurity focus during the recent election.

According to ITProPortal, meanwhile, France set aside 1 billion euros to develop a new national security strategy, and Australia announced plans to ramp up government cyber spending over the next few years. And where governments invest, so do private equity firms. In the United Arab Emirates, for example, the cybersecurity market is predicted to reach $10 billion in just two years, up from only half that much in 2014.

Investing in Cybersecurity From the Ground Up

Of course, big Israeli cybersecurity investment, even mirrored across other countries, can’t magically create enough trained employees to take on new security roles. Thankfully, there is some movement in this area as well.

The Denver Post reported that technology boot camp SecureSet Academy recently secured $4 million in series A funding, expanded into a new city and announced intentions to grow even more in 2017. This is the other, equally necessary side of security investment: Without trained staff to implement and manage security tools, even cutting-edge technologies won’t safeguard critical data.

The cybersecurity market is cooling globally, but a number of hot spots are driving the development of young talent and ambitious startups. Yet investment alone won’t be enough to safeguard corporate networks. Together, training and technology are the ultimate one-two punch.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today