• Skip to primary navigation
  • Skip to main content

Akshay Aggarwal

on Entrepreneurship, AI & Security

  • Entrepreneurship
  • Artificial Intelligence
  • Cybersecurity
  • Show Search
Hide Search
You are here: Home / Archives for Entrepreneurship

Entrepreneurship

2025 Cybersecurity Trends Impacting Investments: The Strategic Role of AI

Introduction

Summary of 2025 Cybersecurity Trends Impacting Investments: The Strategic Role of AI

Cybersecurity is no longer a niche within software—it’s now a battleground of constant innovation, defined by adversarial dynamics and regulatory scrutiny. The defining theme of the next 24 months is artificial intelligence. AI is rapidly transforming how attackers operate and how defenders must respond. For investors, this shift creates asymmetric opportunities: firms that harness AI to automate detection, accelerate response, and protect novel attack surfaces will outpace those relying on legacy models. Conversely, AI-augmented threats will expose the limits of traditional defenses—pressuring boards, CISOs, and insurers to rethink cybersecurity spend.

I. Cybersecurity’s Strategic Differentiators from the Software Industry

The cybersecurity market is distinct from general software in ways that materially impact buying behavior and investment strategy:

  • Adversary-Driven Innovation: Security solutions face an intelligent, adaptive opponent. This creates a Darwinian cycle of rapid obsolescence and product refreshes—far faster than typical enterprise software.
  • Invisible ROI: Unlike CRM or ERP, the value of cybersecurity is realized by what doesn’t happen (breaches, ransom, legal fines). Buyers trust reputation, not just features.
  • Regulation as a Revenue Driver: Mandates like NIS2 (EU), SEC cyber-disclosure rules (US), and upcoming AI safety standards are effectively mandating spend.
  • M&A as a Constant: Acquisitions drive both innovation and exit velocity. Cyber is one of the few sectors where “acqui-hires” remain viable due to talent scarcity.
  • Reliance on Platforms + Best-of-Breed Point Solutions: The vendor landscape remains fragmented despite consolidation trends, creating opportunities for both narrow innovators and platform roll-ups.

II. AI’s Emerging Role in Cybersecurity

A. AI as a Threat: Offensive Capabilities

Adversaries are already operationalizing AI to scale and sophisticate attacks. This is not hypothetical—it’s happening now, and it’s altering the economics of cybercrime.

Offensive AI UseDescriptionInvestment Implication
Phishing 2.0Generative AI crafts hyper-personalized emails, voice and video deepfakes.Demand spike for identity verification, behavioral biometrics, and email security.
Vulnerability DiscoveryLLMs analyze public code repos and binaries to identify zero-days at scale.Application security and SBOM tooling (e.g., supply chain protection) are now critical.
Malware MutagenesisAI generates polymorphic malware that evades signature-based tools.Increases demand for behavior-based endpoint protection (EDR/XDR).
Chatbot HijackingPrompt injection and jailbreaking attacks target AI systems themselves.New submarket for “AI system security” is emerging—early-stage opportunity.

The adversary’s cost to attack has dropped. Enterprises’ cost to defend is rising. This asymmetry means demand for automation, prevention, and recovery tooling will continue to outpace broader IT spend.

B. AI as a Defense: Realizable Value in 24 Months

The AI arms race isn’t just about attacks—defenders are responding. Several capabilities are already producing measurable ROI and competitive differentiation:

Defensive AI CapabilityDescriptionNear-Term ROI (0–24m)
Anomaly Detection (UEBA)Behavioral analytics using ML models to spot insider threats or account takeovers.Already embedded in major SIEM/XDR solutions. Improves detection, reduces alert fatigue.
Automated Triage & Response (SOAR)AI-powered playbooks reduce MTTR (Mean Time to Respond).Cuts staffing costs and speeds up remediation. Mature in MDR/MSSP offerings.
Threat Intelligence CorrelationML links threat signals across telemetry (network, endpoint, identity).Enhances efficacy of threat hunting. Drives consolidation into unified platforms.
Generative SecOpsLLMs assist analysts by summarizing threats, suggesting queries, and writing playbooks.Emerging, but early deployments show 20–30% productivity gains in SOCs.
Secure Code GenerationAI-enhanced IDEs spot security bugs or generate safer code.GitHub Copilot, Replit, and Snyk already integrating. Popular with devs.

Defensive AI is already monetizing. Leading vendors (CrowdStrike, Palo Alto Networks, Microsoft, SentinelOne) are building moats based on proprietary threat data pipelines and ML tuning. The winners will be those who combine visibility with velocity.

III. Market Shifts Shaped by AI (2025–2027)

1. Cloud Security and AI-Native Defenses

Cloud workloads are exploding—but so are misconfigurations and lateral movement attacks. AI helps address cloud-native threats (e.g., identity drift, privilege escalation, API abuse). Expect a new wave of “autonomous cloud security” vendors or features built into CNAPPs (Cloud-Native Application Protection Platforms). Ai-enabled auto remediation from firms like HTCD will redefine and shorten window of vulnerability from months to days or even hours.

Investor Watchpoint: Companies like Wiz, Lacework, and Orca are embedding ML-based anomaly detection directly into cloud runtime. High valuation, but strong market pull. Newcomers like HTCD will fix vulnerabilities at machine scale.

2. Identity Security in the Era of Deepfakes

As generative deepfakes challenge traditional MFA and video verification, the next-gen identity market is forming around continuous authentication and passive biometrics. Expect demand for behavioral signal-based identity proofing (keystroke cadence, mouse movement, typing pressure).

Investor Watchpoint: Vendors in identity verification (e.g., AuthID, BioCatch, Ping Identity) are already pivoting toward “behavioral zero trust.” Strategic M&A targets.

3. XDR Platforms with AI-Driven Detection

Extended Detection and Response (XDR) platforms are evolving from telemetry aggregators to autonomous detection engines. The XDR of tomorrow is an AI-driven defense fabric. AI is making detection less about “rules” and more about patterns unseen by humans.

Investor Watchpoint: Leading XDR vendors (SentinelOne, CrowdStrike, Palo Alto) will either expand AI R&D or acquire to stay ahead. Look for differentiated IP in federated learning and adversarial ML.

4. Cybersecurity for AI Systems

Securing AI models themselves—preventing data poisoning, prompt injection, and model exfiltration—is now a new domain. As AI is embedded into business logic, AI security will be treated as an enterprise risk category.

Investor Watchpoint: New startups (e.g., Lakera, HiddenLayer) are emerging with niche AI security tools. It’s early but parallels the rise of AppSec 10 years ago. High-potential greenfield.

IV. Barriers to AI Adoption in Security

Despite the promise, several frictions remain for widespread AI integration:

  • Explainability: CISOs are wary of “black box” AI. If a system flags a threat, they need to understand why—especially for compliance and incident response reporting.
  • False Positives/Negatives: Poorly tuned models can create alert fatigue or miss subtle attacks. These damages trust in AI systems.
  • Data Quality & Privacy: High-fidelity ML models require massive datasets—often containing sensitive logs. Data privacy regulations (GDPR, HIPAA) can restrict training.
  • Integration Complexity: AI solutions must integrate with legacy infrastructure—SIEMs, ticketing systems, etc. Vendor lock-in and closed ecosystems are pain points.
  • Skill Gaps: Operating AI-enhanced SecOps requires talent with both security and ML skills—a scarce profile.

Implication for Investors: Look for companies solving these frictions—e.g., startups offering explainable AI, synthetic data for model training, or APIs that abstract model complexity from the user.


V. Investment Implications

A. AI is an Enabler, Not a Strategy

A recurring mistake: backing a “cybersecurity + AI” pitch with no proof of problem solved. Investors should treat AI like encryption—it’s necessary, but not sufficient. The bar is real-world, referenceable deployments with measurable uplift (e.g., 30% fewer false positives, 2x faster MTTR).

B. Moats Will Be Data-Driven

The strongest AI models will be trained on proprietary, longitudinal threat data. Companies with large, diverse customer footprints and unified telemetry pipelines (e.g., Microsoft, CrowdStrike) are best positioned to compound their advantage.

C. Vertical-Specific AI Security is Coming

Sectors like healthcare, finance, and industrials will require tailored AI defense stacks due to unique data types and compliance needs. Vertical-focused security vendors (e.g., MedCrypt in healthcare) may command premium valuations as AI threats grow.

D. AI Startups Will Be Consolidation Targets

Expect ongoing M&A as legacy vendors acquire AI-native teams to stay competitive. For startups, the most likely exit remains acquisition—especially if they show technical differentiation + SOC integration readiness.

VI. Final Thought: Navigating the AI-Cyber Nexus

Cybersecurity is now a contest of data, intelligence, and speed. AI doesn’t replace defenders—but it does reshape the landscape for attackers and defenders alike. Over the next 24 months, enterprises will prioritize tools that reduce human workload, detect earlier, and automate response. Buyers will reward vendors that deliver trust through transparency and defensibility through data.

For investors, this is the moment to shift due diligence toward:

  • AI capability as a product differentiator, not just a buzzword
  • Explainability and integration as success indicators
  • Data access and telemetry breadth as competitive moats
  • Defense against both novel attacks and AI attacks

The adversary has AI. The defenders must, too. That is where the next cybersecurity alpha lies.

Google and Wiz – Synergies of a collapsed deal

In the summer of 2023, I wrote an opinion on potential deals in cloud security. The scenario I proposed to a group of investors was Google’s acquisition of Wiz. Here are my curated excerpts on the synergies of the deal.

While Google Cloud has made significant strides in security and privacy, it still faces challenges compared to its competitors AWS and Azure. One area where Google Cloud lags is in the depth and breadth of its security toolset. AWS and Azure offer a more extensive array of integrated security services, such as AWS’s comprehensive suite of threat detection and compliance tools, and Azure’s advanced security management capabilities through Azure Sentinel and Microsoft Defender for Cloud. Additionally, Google Cloud’s enterprise adoption in highly regulated industries is growing, but AWS and Azure have historically had stronger footholds in these sectors due to their longer market presence and more extensive focus on compliance. As a result, some organizations perceive AWS and Azure as more mature and better equipped for complex and varied security and privacy needs, impacting Google Cloud’s competitive positioning in these areas.

Google might consider acquiring Wiz for several strategic reasons:

Strengthening Cloud Security: Wiz is a leading player in cloud security and vulnerability management. By acquiring Wiz, Google could enhance its security offerings, providing its customers with more robust tools to protect their cloud environments, which is a critical area of focus in the cloud market.

Expanding Security Capabilities: Wiz’s advanced security features, such as comprehensive vulnerability assessment and threat detection, could complement and extend Google Cloud’s existing security portfolio. This could lead to more integrated and sophisticated security solutions for Google Cloud customers.

Enhancing Competitiveness: The cloud security space is highly competitive, with players like Microsoft Azure and AWS also investing heavily in security. Acquiring Wiz could give Google a competitive edge by offering superior security capabilities that could attract and retain more customers.

Improving Compliance and Risk Management: Wiz’s tools help organizations maintain compliance and manage risks effectively. Integrating Wiz’s capabilities could improve Google Cloud’s compliance features, making it more appealing to customers in highly regulated industries.

Leveraging Wiz’s Expertise: Wiz brings a wealth of expertise and a talented team in cloud security. Google could benefit from this knowledge and experience, which could accelerate the development of Google Cloud’s security features and innovation.

Expanding Customer Base: Wiz serves a wide range of enterprises and organizations. By acquiring Wiz, Google could potentially attract these customers to Google Cloud, increasing its market share and customer base.

Integrating Security Across Services: By integrating Wiz’s technology with Google Cloud’s infrastructure, Google could provide a more seamless and cohesive security experience across all its cloud services, enhancing overall user satisfaction and trust.

Strategic Growth: Acquisitions like Wiz align with Google’s broader strategy to grow its cloud business. Strengthening the security aspect of Google Cloud is crucial for long-term growth and success in the cloud computing market.

Growing Revenue: Expected Wiz 2023 Revenue $350M ARR, with 2025 projections at $1B ARR. Acquisition is projected to boost CAGR to over 175% for first three years.

In summary, acquiring Wiz could significantly bolster Google Cloud’s security capabilities, help it compete more effectively, and attract a broader range of customers, all of which are crucial for maintaining and expanding its position in the cloud market.

As I recount this in 2024, this scenario became almost real. With the deal collapsed, and Wiz destined for an IPO that is likely to be one of the most exciting for the security industry in the near future.

Zove Security’s AI Technology Unit Acquired To Protect High-Value Targets

Zove Security’s AI unit acquired, enhancing cyber defense for high-value targets with ZoveTrustAI technology

Malicious actors are leveraging AI to scale complex attacks at lower costs. The ZoveTrustAI platform protects critical individuals from sophisticated attacks and paves the path to autonomous defense.” — Akshay Aggarwal, CEO, Zove Security

SEATTLE, WASHINGTON, USA, June 25, 2024 /EINPresswire.com/ — Zove Security, a leading provider of emerging technology and information security capabilities, announced today that its AI technology unit has been acquired by a stealth firm, a subsidiary of a renowned global technology enterprise. The acquisition includes all technology assets, exclusive rights to the ZoveTrustAI platform, and Zove’s dedicated operations team. The integration of Zove’s assets into the acquiring firm will be completed over the third quarter of the calendar year. The financial terms of the acquisition are not being disclosed.

ZoveTrustAI: A Game-Changer in Cybersecurity

The deal encompasses the proprietary ZoveTrustAI platform, an artificial intelligence system for devices that merges generative models with personal context and threat reports. This unique solution delivers incredibly relevant and actionable intelligence, enhancing cyber risk management by combining on-device large language models (LLMs) and server-based models. During field trials, ZoveTrustAI successfully identified multiple instances of previously unknown active attacks, demonstrating its effectiveness in real-world scenarios.

A Fruitful Collaboration

For almost two years, Zove Security co-created the solution with the acquiring firm. This solution protects high-value targets (HVTs), including executives, celebrities, and other sensitive individuals from cybercriminals and adversarial state actors. This partnership has focused on active attack identification, leveraging the strengths of both organizations to develop and refine ZoveTrustAI.

Future Integration and Capabilities

Post-acquisition, ZoveTrustAI will be integrated into a security solution designed to manage cyber risk for high-risk individuals. This technology is poised to revolutionize fraud detection and cyberattack response by utilizing personal context and on-device LLMs to deliver autonomous defense mechanisms. With secure on-device data processing, it will ensure your privacy while providing robust protection. It is designed to be smart, adaptive, and always one step ahead.

CEO Statement

Akshay Aggarwal, Founder and CEO of Zove Security, stated, “Advancements in Artificial Intelligence (AI) are poised to significantly impact cybersecurity. For most enterprises, AI presents both threats and potential. Malicious actors are leveraging AI to scale complex attacks at lower costs. The ZoveTrustAI platform allows enterprises to protect their critical users from sophisticated attacks and paves the path to autonomous defense.”

About Zove Security

Zove Security secures the products and platforms that power innovation and underpin our digital lives. Their mission is Platform Trust through secure engineering and trusted operations, ensuring users trust the technology they use and the companies behind them.

About the Acquiring Firm

The acquiring firm, currently in stealth mode, is part of a leading global tech enterprise known for its innovation and premium consumer electronics, including smartphones, PCs, tablets, wearables, and a range of software and services.

AKSHAY’S UNCERTAINTY PRINCIPLE: OBSERVING SOME METRICS CHANGES THEM

“The more precisely the position is determined, the less precisely the momentum is known in this instant, and vice versa.”
–Heisenberg, uncertainty paper, 1927

The Uncertainty principle is related to the observer effect. In physics, the term observer effect refers to changes that the act of observation will make on the phenomenon being observed.

Ok, now to get to the point. Leaders are often asked to produce several performance metrics or revenue metrics. Some of these metrics are simple and straightforward  Key Performance Indicators (KPIs). KPIs can include net revenue, profit, # of new customers or in our case customer satisfaction numbers.

The problem with metrics crops up when we need to measure a property and no mechanism exists to measure it quickly or the metric is not representative of the property being measured. In general this happens when the following scenarios arise:

Effect of observation
  1. Metric is not available: No mechanism is in place to measure the property at that time.
  2. Property is not measurable: No metrics are available to capture the property.
  3. Deliver unplanned metrics quickly: Metrics that the system was not designed to capture need to be measured quickly.
  4. CSF masquerading as KPI: Critical Success Factors are vital elements for a strategy to be successful and should not be confused with KPIs which quantify strategic performance.  The metric being asked for is a CSF not a KPI.

In simple words, the amount of effort required to measure the metric changes the amount of effort we can dedicate to create the metric. The act of measuring the metric changes it.  For example, in the economic downturn several teams have had to reduce headcount. If this barebones team is now asked to capture  information on how a recently released tool is being used by customers without that mechanism already in place, then they cannot deliver that metric without additional effort that will impact the overall KPIs.The problem that arises is what I’ve dubbed the Akshay’s Uncertainty Principle:

In a resource constrained environment, a new or modified metric cannot be measured without impacting the metric itself.

– Akshay Aggarwal

Finally, an explanation the kxcd way

GitLab acquires DevSecOps startups Peach Tech and Fuzzit

GitLab Homepage

GitLab has acquired a pair of startups as the DevOps giant doubles down on security support for development teams. While GitLab is perhaps better known for its GitHub-like collaborative code-hosting platform, the San Francisco-based company has been pushing deeper into the developer workflow, covering all facets of development, deployment, monitoring, and security.

The premise behind DevSecOps (developer security operations) is that developers should consider security a fundamental part of software development from the get-go, rather than building a product and then stress-testing it just before it ships. This process requires developer and security teams to work closely together.

GitLab has snapped up Peach Tech, a Seattle-based startup that specializes in software security testing. More specifically, Peach Tech offers a fuzz testing — or “fuzzing” — product that automatically throws invalid or random data at a computer program before it’s deployed to see how it reacts. This can help developers find bugs and other flaws that could be exploited by bad actors. The company also offers an automated DAST API security testing tool that enables companies to test their APIs against the OWASP Top-10 security risks. Additionally, GitLab has bought Tel Aviv-based Fuzzit, which offers a fuzzing service similar to Peach Tech’s. It’s all about “finding bugs and vulnerabilities before the bad guys do,” as the Israeli startup puts it.

Terms of the deals were not disclosed, but David DeSanto, director of product at GitLab’s Secure and Defend unit, confirmed that the Fuzzit and Peach Tech teams — including the founders — will join GitLab, and both startups’ standalone services will be wound down.

It’s also worth noting that the recent surge in remote work due to the COVID-19 crisis has cast a spotlight on cybersecurity, with officials from the U.S. and U.K. recently issuing warnings about the increased risk of hacking due to insecure machines on home networks.

“There is definitely a correlation between the global impact of COVID-19 and the need to implement security best practices,” DeSanto told VentureBeat. “As more organizations transition to remote work, both IT operations and security teams need to evaluate how developers access company resources securely. There is a need to evaluate principles like zero-trust and multi-factor authentication to enable your organization to securely work [remotely]. Furthermore, there has been a push to use more SaaS platforms, like GitLab, which support these principles.”

DevSecOps

GitLab has offered features aimed at security personnel for several years, and its dedicated security dashboard gives companies an overview of the various vulnerabilities across their projects and allows them to drill down into each one. With the launch of GitLab 12.0 last year, the company was ready to truly position itself as the platform for developer security teams.

Above: GitLab security dashboard

While Fuzz testing is an entirely new product offering for GitLab, the company does currently offer its own DAST API testing tool. Over the next six months, however, GitLab will replace its existing DAST API functionality with Peach Tech’s incarnation.

GitLab had made three known acquisitions before now, the last one back in 2018 when it procured Canadian cybersecurity startup Gemnasium, a platform that enables developers to address security vulnerabilities in open source code. The latest acquisitions are consistent with GitLab’s previously stated aim, which is to create an all-in-one platform for developers, security, and operations teams.

The goal with Peach Tech and Fuzzit is to integrate their various technologies into GitLab, meaning customers won’t need to use standalone fuzz testing services. It’s also one more reason for an enterprise client to upgrade to the Gold / Ultimate plan, the most expensive of GitLab’s subscription tiers.

“Fuzzit and Peach Tech will be completely integrated into GitLab and will be available as part of the GitLab platform,” DeSanto said. “Full integration has started, and GitLab users will begin to use these new technologies starting in July, with full integration expected to be done by the end of the year.”

GitLab raised $268 million at a $2.7 billion valuation back in September, and it’s currently gearing up for a planned IPO this November.


Original post is at VentureBeat

  • Page 1
  • Page 2
  • Go to Next Page »

Akshay Aggarwal

Copyright © 2025 · Akshay Aggarwal