Innovating Without Fear: How Oasis Security Is Tackling the Explosion of Non-Human Identities
We recently sat down with Adam Ochayon, Director of Product Strategy & GTM at Oasis Security, to explore the company’s mission, what makes them stand out, and why the future of non-human identity management is so exciting. A Mission to Let Innovation Flourish Oasis Security’s mission is clear: “We want organizations to be able to […]
Inside Smallstep: The Startup Making Waves in Device Trust and Security
When it comes to startups making waves in cybersecurity, Smallstep is a name that’s hard to miss. Founded in 2016, the company was born from a firsthand frustration: while working as CTO for an online gambling company, founder Michael realized the industry was facing a fundamental issue with how developers were pushing code. Determined to […]
Building Superhuman Security Teams: How Twine Security Is Transforming Cybersecurity Execution
In today’s cybersecurity world, teams are drowning in work. Alerts flood in, tasks pile up, and even the best-resourced security teams struggle to keep up. That’s where Twine Security comes in — a company on a mission to transform how cybersecurity teams operate by giving them something they’ve never had before: digital humans. We spoke […]
Breaking Barriers and Building Differently: The Founding Story Behind Edera
When we sat down with one of the founders of Edera, you quickly realise this isn’t just another security startup. It’s a company built on innovation, grit, and a bold mission to challenge both technology and the status quo of leadership. We recently had the privilege of sitting down with Emily Long, CEO and Founder […]
The Impact of AI on Cybersecurity Sales: Hype vs. Reality
Artificial Intelligence (AI) is the buzzword of the decade, revolutionizing industries from healthcare to finance. Cybersecurity sales is no exception. AI-driven tools promise to supercharge sales strategies, accelerate deal cycles, and make prospecting a breeze. But how much of this is reality, and how much is just hype? Let’s separate fact from fiction and explore […]
Compensation Plans That Actually Motivate Cybersecurity Sales Teams
Cybersecurity sales isn’t for the faint of heart. The sales cycle is long, prospects are skeptical, and getting past the technical gatekeepers is an art form. Yet, many companies still use generic compensation plans that fail to incentivize the right behaviors. A well-structured comp plan can be the difference between a high-performing sales team and […]
The Path from Founding AE to Sales Leader: What to Expect
Stepping up from a founding Account Executive (AE) to a sales leader is a thrilling yet demanding journey. In a startup’s early days, founding AEs are the revenue engine, hunting for deals, refining the sales process, and closing business. But as the company scales, those same AEs often face the opportunity and challenge of evolving […]
The Growing Demand of Account Executives (AEs) in Cybersecurity
The cybersecurity industry is booming, and so is the need for skilled Account Executives (AEs). With cyber threats becoming more frequent and complex, businesses are focused on strengthening their defenses, which has led to a high demand for cybersecurity solutions. This, in turn, creates opportunities for AEs to help companies navigate the complex cybersecurity landscape. […]
Top 5 Recruitment Pitfalls to Avoid When Hiring for Cybersecurity Sales
Hiring for cybersecurity sales roles is no easy task. The stakes are high, and the landscape is constantly evolving, making it crucial to find candidates who not only understand the technical side of cybersecurity but also possess the skills to sell complex solutions effectively. Whether you’re a growing cybersecurity firm or a seasoned player in […]
Essential Skills for Cybersecurity Engineers in 2025
The world of cybersecurity is changing faster than ever before. As cyber threats become increasingly sophisticated, the role of essential skills for cybersecurity engineers is no longer just about protecting systems from known risks. In 2025, it’s about staying one step ahead: anticipating future attacks, adapting to ever-changing technology, and implementing proactive, intelligence-driven security strategies. […]