{"id":52697,"date":"2023-07-10T22:28:00","date_gmt":"2023-07-10T22:28:00","guid":{"rendered":"https:\/\/www.darkreading.com\/operations\/analysts-cybersecurity-funding-uptick-2h-2023"},"modified":"2023-07-10T22:28:00","modified_gmt":"2023-07-10T22:28:00","slug":"analysts-cybersecurity-funding-set-for-rebound","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/","title":{"rendered":"Analysts: Cybersecurity Funding Set for Rebound"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt070780738e28c7a2\/64ac54bc5fa986a71483cf9d\/wallstreet_emin_kuliyev_shutterstock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>In line with prior expectations, financing deals, and mergers and acquisition (M&amp;A) activity in the cybersecurity sector appears to have dipped in the second quarter.&nbsp;However, analysts tracking the market have a more upbeat assessment for the rest of 2023 \u2014 compared to three months ago \u2014 with most now expecting a modest recovery on both fronts by the end of the year.<\/p>\n<p>A lot of the optimism has to do with enterprises continuing to invest heavily in cybersecurity, despite a slowdown in other expenditures. Market research firm IDC expects that <a href=\"https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS50498423#:~:text=NEEDHAM%2C%20Mass.%2C%20March%2016,International%20Data%20Corporation%20(IDC).\" target=\"_blank\" rel=\"noopener\">organizations will spend some $219 billion<\/a> this year on security products and services \u2014 or some 13% more than they did in 2022 \u2014 to address threats, to support hybrid work environments, and to meet compliance requirements. The areas that will receive the most spending are managed security services, endpoint security, network security, and identity and access management.<\/p>\n<p>&#8220;While the theme of conservatism and expectations for continued headwinds have remained throughout the first half of the year, we do expect to see strategic activity slowly begin to rebound in the second half of 2023 and into 2024,&#8221; says Eric McAlpine, founder and managing partner of analyst firm Momentum Cyber. Financing and M&amp;A activity will both eventually pick up as companies that were able to make do financially so far begin to feel the need for fresh capital to fuel their business, he says.<\/p>\n<p>Data from Pinpoint Search Group shows that cybersecurity companies <a href=\"https:\/\/pinpointsearchgroup.com\/cyber-security-vendor-funding-report-q2-2023\/\" target=\"_blank\" rel=\"noopener\">raised a total of some $1.9 billion<\/a> in 97 funding rounds in Q2. That was 35% lower than last quarter&#8217;s $2.9 billion, and some 55% lower than the funding that cybersecurity firms raised in the year-ago quarter.<\/p>\n<p>&#8220;As interest rates cooled multiples and the exit market, cybersecurity-focused venture capital (VC) certainly slowed down, particularly in comparison to 2021 and 2022,&#8221; says Alex Doll, partner at cybersecurity investment firm Ten Eleven Ventures. &#8220;Valuations got tighter and the demands of investors to see clear signs of demand and traction were elevated,&#8221; he says. Hiring by VC-backed companies too slowed considerably as companies re-forecast expectations and planned for longer runway times, Doll says.<\/p>\n<h2 class=\"regular-text\">A Handful of Big Investments in Cyber in Q2<\/h2>\n<p>There were several significant investments that venture capital firms and others made in cybersecurity companies last quarter. Easily the biggest among them was the $190 million that managed detection and response (MDR) vendor <a href=\"https:\/\/finance.yahoo.com\/news\/blackpoint-cyber-secures-190-million-130000836.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly9kdWNrZHVja2dvLmNvbS8&amp;guce_referrer_sig=AQAAAFDLfs0Ov2ftYcjRicYU5NLc7uu2wfceRYjgquK0C--kyp3hRwgGRildvdDvkF4MXAfn_iLPHLVc1UaTSB2xNUUVaEMlWjcI2RL-R-ZtjVGSl-JphNBZxWOnFQvVUiYD4FZyMu7QgF1xP1B2QOUC9VwPGEysIRoXEDG3s-8QWPTt\" target=\"_blank\" rel=\"noopener\">BlackPoint Cyber raised in a growth investment round<\/a> led by Bain Capital, with participation from Accel and several other investors. BlackPoint will use the funds to fuel further development of the company&#8217;s MDR, managed application control, cloud response, and logging and compliance technologies.<\/p>\n<p>Another big transaction was the $132 million that online identity verification vendor <a href=\"https:\/\/insights.id.me\/press-releases\/id-me-appoints-samantha-greenberg-as-chief-financial-officer-and-raises-132-million-in-series-d-funding\/?cn-reloaded=1\" target=\"_blank\" rel=\"noopener\">ID.me secured in April in a Series D funding<\/a> round led by Viking Global Investors with participation from Morgan Stanley Counterpoint, CapitalG, FTV Capital, and others. The investment brought to $275 million the total amount the McLean, Va.-based company has raised from investors since its 2010 launch.<\/p>\n<p>Two other funding transactions hit the $100 million mark. One was a <a href=\"https:\/\/finance.yahoo.com\/news\/cybereason-secures-100-million-funding-133000362.html\" target=\"_blank\" rel=\"noopener\">$100 million investment in Cybereason<\/a> that Softbank and other investors made in April to support the company&#8217;s growth plans in the XDR and EDR market. So far, Cybereason has raised over $850 million from various investors, including Google. The latest cash infusion came just six months after the <a href=\"https:\/\/www.darkreading.com\/careers-and-people\/layoffs-mount-cybersecurity-vendors-hunker-down\" target=\"_blank\" rel=\"noopener\">company laid off 17% of its workforce<\/a> last October and highlighted the continued confidence investors have in Cybereason.<\/p>\n<p>Meanwhile, a&nbsp;Series B funding round of $100 million that Cyera raised in June highlighted investor interest in the emerging market for &#8220;<a href=\"https:\/\/www.darkreading.com\/cloud\/ibm-s-polar-buy-focus-shadow-data-cloud-security\" target=\"_blank\" rel=\"noopener\">data security posture management<\/a>&#8221; technologies.<\/p>\n<p>&#8220;While investment in Q2 has been down overall, high-performing companies with solid fundamentals are continuing to receive large rounds of financing, even in a challenging economic environment,&#8221; McAlpine notes.<\/p>\n<h2 class=\"regular-text\">Strategic Mergers &amp; Acquisitions Continue<\/h2>\n<p>Pinpoint said it counted <a href=\"https:\/\/pinpointsearchgroup.com\/cyber-security-vendor-funding-report-q1-2023\/\" target=\"_blank\" rel=\"noopener\">18 M&amp;A transactions in the cybersecurity sector in Q2<\/a> \u2014 a significant drop from the 31 similar transactions it counted in the first quarter of the year.<\/p>\n<p>The biggest of the lot \u2014 from a strategic standpoint \u2014 was F-Secure&#8217;s <a href=\"https:\/\/www.businesswire.com\/news\/home\/20230424006014\/en\/Lookout-Announces-Acquisition-of-its-Consumer-Mobile-Security-Business-Segment\" target=\"_blank\" rel=\"noopener\">$223 million acquisition<\/a> of Lookout&#8217;s mobile consumer security business. McAlpine says F-Secure has described the purchase as allowing it to nearly triple its market presence in the US and strengthen its position in the communication service provider segment.<\/p>\n<p>Rik Turner, an analyst with Omdia, identified <a href=\"https:\/\/blogs.cisco.com\/news\/blogs-cisco-com-news-cisco-announces-its-intent-to-acquire-cloud-security-software-company\" target=\"_blank\" rel=\"noopener\">Cisco&#8217;s purchase of Lightspin<\/a> in March and <a href=\"https:\/\/blogs.cisco.com\/news\/cisco-announces-intent-to-acquire-armorblox\" target=\"_blank\" rel=\"noopener\">Armorblox<\/a> in May \u2014 both for an undisclosed amount \u2014 are two other acquisitions to watch. Cisco&#8217;s purchase of Lightspin gives it a presence in the cloud security posture market, though it is still some way behind the likes of Palo Alto Networks in that space, Turner says.&nbsp;<\/p>\n<p>&#8220;It will be interesting to see whether it combines that technology with what it got two months later when it bought Armorblox,&#8221; Turner notes.<\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/cloud\/ibm-s-polar-buy-focus-shadow-data-cloud-security\" target=\"_blank\" rel=\"noopener\">IBM&#8217;s purchase of Polar<\/a>, again for an undisclosed sum, bears watching as well, Turner says. &#8220;We&#8217;ve been watching DSPM, which, until this acquisition, was a sector made up almost entirely by start-ups,&#8221; he notes. IBM&#8217;s entry into the space could trigger a landgrab in the market by other major vendors, Turner notes.<\/p>\n<h2 class=\"regular-text\">New Opportunities for Private Equity Firms<\/h2>\n<p>Meanwhile, falling valuations continued to create new investment opportunities for private equity (PE) firms as they did in Q1. Among the more notable PE transactions in 2023 was Crosspoint Capital&#8217;s acquisition of Vancouver-based endpoint-security vendor <a href=\"https:\/\/www.absolute.com\/company\/press-releases\/2023\/absolute-software-to-be-acquired-by-crosspoint-capital-partners-for-enterprise-value-of-us-870-million\/\" target=\"_blank\" rel=\"noopener\">Absolute Software<\/a> for $657 million in May and <a href=\"https:\/\/www.prnewswire.com\/news-releases\/cinven-to-acquire-archer-301796617.html\" target=\"_blank\" rel=\"noopener\">Cinven&#8217;s purchase<\/a> of governance, risk, and compliance software vendor Archer for an estimated $1.3 billion in April.<\/p>\n<p>Crosspoint&#8217;s purchase price represented an approximately 34% premium over Absolute&#8217;s share price of $8.58 on May 10, 2023. When the acquisition is complete, Absolute&#8217;s shareholders will receive $11.50 in cash per common share.<\/p>\n<p>&#8220;One thing to watch is how Crosspoint is amassing a veritable stable of cyber firms,&#8221; Turner says. The firm already owns or has stakes in Forescout, ExtraHop, ReversingLabs, Digicert, RSAC, McAfee, Cyware, and others, Turner notes, adding that it&#8217;s possible that Crosspoint could do some &#8220;corporate engineering&#8221; and bring different bits of these companies together at some point.&nbsp;Or the PE firm could &#8220;simply inject some capital into all of them with a view to spinning them back out when the time is right,&#8221; he says.<\/p>\n<p>Meanwhile,&nbsp;Cinven did not disclose the financial details of its purchase of Archer from RSA Security in April. However, data that Momentum Cyber compiled from various industry sources for its second-quarter financial roundup, estimated the transaction value at $1.3 billion.<\/p>\n<p>Sectors that have received significant funding throughout 2023 include identity and access management, data security posture management (DSPM), and data detection &amp; response (DDR), McAlpine says. He adds,&nbsp;&#8220;We&#8217;re also seeing increased attention from investors on startups helping companies use emerging forms of AI \u2014 <a href=\"https:\/\/www.darkreading.com\/analytics\/chatgpt-subs-security-analyst-hallucinates-occasionally\" target=\"_blank\" rel=\"noopener\">large language models and generative AI<\/a> \u2014 securely.&#8221;<\/p>\n<p>Going forward,&nbsp;Doll from Ten Eleven Ventures says that while VC funding has slowed overall, compared to other sectors, cybersecurity continues to present an attractive opportunity for investors. &#8220;For the right companies, capital is definitely available,&#8221; Doll says. Cybersecurity also continues to be a priority for enterprise organizations, and there are signs of new investments in areas such as AI: &#8220;We think investing in the sector will accelerate again in the next 12 to 18 months,&#8221; Doll notes. &#8220;There&#8217;s a lot of growth ahead, as attacks persist \u2014 in fact, enabled by AI \u2014 and new attack vectors, such as AI itself become more apparent.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/operations\/analysts-cybersecurity-funding-uptick-2h-2023\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Analysts seem bullish about funding and M&#038;A activity for the second half of the year, though transaction volumes and values dipped again in Q2.Read More <a href=\"https:\/\/www.darkreading.com\/operations\/analysts-cybersecurity-funding-uptick-2h-2023\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-52697","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analysts: Cybersecurity Funding Set for Rebound 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analysts: Cybersecurity Funding Set for Rebound 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-10T22:28:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt070780738e28c7a2\/64ac54bc5fa986a71483cf9d\/wallstreet_emin_kuliyev_shutterstock.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Analysts: Cybersecurity Funding Set for Rebound\",\"datePublished\":\"2023-07-10T22:28:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/\"},\"wordCount\":1231,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt070780738e28c7a2\\\/64ac54bc5fa986a71483cf9d\\\/wallstreet_emin_kuliyev_shutterstock.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/\",\"name\":\"Analysts: Cybersecurity Funding Set for Rebound 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt070780738e28c7a2\\\/64ac54bc5fa986a71483cf9d\\\/wallstreet_emin_kuliyev_shutterstock.jpg\",\"datePublished\":\"2023-07-10T22:28:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt070780738e28c7a2\\\/64ac54bc5fa986a71483cf9d\\\/wallstreet_emin_kuliyev_shutterstock.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt070780738e28c7a2\\\/64ac54bc5fa986a71483cf9d\\\/wallstreet_emin_kuliyev_shutterstock.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/analysts-cybersecurity-funding-set-for-rebound\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analysts: Cybersecurity Funding Set for Rebound\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analysts: Cybersecurity Funding Set for Rebound 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/","og_locale":"en_US","og_type":"article","og_title":"Analysts: Cybersecurity Funding Set for Rebound 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-07-10T22:28:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt070780738e28c7a2\/64ac54bc5fa986a71483cf9d\/wallstreet_emin_kuliyev_shutterstock.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Analysts: Cybersecurity Funding Set for Rebound","datePublished":"2023-07-10T22:28:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/"},"wordCount":1231,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt070780738e28c7a2\/64ac54bc5fa986a71483cf9d\/wallstreet_emin_kuliyev_shutterstock.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/","url":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/","name":"Analysts: Cybersecurity Funding Set for Rebound 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt070780738e28c7a2\/64ac54bc5fa986a71483cf9d\/wallstreet_emin_kuliyev_shutterstock.jpg","datePublished":"2023-07-10T22:28:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt070780738e28c7a2\/64ac54bc5fa986a71483cf9d\/wallstreet_emin_kuliyev_shutterstock.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt070780738e28c7a2\/64ac54bc5fa986a71483cf9d\/wallstreet_emin_kuliyev_shutterstock.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/analysts-cybersecurity-funding-set-for-rebound\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Analysts: Cybersecurity Funding Set for Rebound"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52697"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52697\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}