&



















Perry’s
KnowBe4
Cybersecurity Issues You Never Thought About WFH
Be
Venture Capital Trends 2022 Sustainable Investment
What is the cybersecurity skill crisis?
Why does the skill shortage exist in the first place? How can we tackle the cybersecurity skill shortage Conclusion
What is Remote Access? Are Cloud Servers Secure? Can Hackers Remotely Access Your Computer? Cyber Security Risks: How
Cybersecurity and risks you never thought about
From bathing in the buff to bloomers and bikinis, how women’s swimsuits have always been on the front lines of feminism.
In conversation with Perry Carpenter, Chief Evangelist at KnowBe4
Gaper’s Director of Business Development, Mark Allen, sat down with Perry for a little chat about his professional career and insights about remote work and its future.
radical swimsuit history of the
the
Perry’s Career in IT Perry started out his career as an IT developer and programmer and followed a path that is familiar to most in the field. That is, working up the career ladder until there is no further room for growth. After thispoint, like many others, Perry also started to explore other avenues of professional life. During this, he got into analytics and led a team of statisticians at Sam’s Club (owned by Walmart). He had also worked as a programmer at Walmart before. Perry thenmoved into cybersecurity at Alltel Communications where he ran a lot of their enterprise strategy services for security.
Then, at Gartner, he worked on a number of research areas around identity and access management, data leak prevention, along with mentoring services. He then made aleap into the vendor world where Perry now works in the field of security awareness which entails crafting strategies at KnowBe4 for their customer market.
Q. What was your first programming language? A. C++!
In his early days of programming, Perry alsohad to decode Cobol and JCL at a time when they were falling out of fashion.
Perry has also written a book on the topic called Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors.
He surmises that when we say “security awareness”, it is straightforward enough tounderstand what ‘security’ would mean, but what role does ‘awareness’ have to play?
Awareness here is not restricted to just knowledge. You can teach people, even test them on what they have learned, but it won’t be meaningful until theyactually implement their learnings and apply theprinciples in practice. So, Perry’s focus has thus been focused on delivering services that are aimed at channeling anddeveloping the right behaviors.
Perry finds that “security awareness” has an inherent logical fallacy (he discusses this in his book as well). It suffers from what Perry calls the ‘knowledge-intention-behavior gap’. This is to say that just because we know somethingdoes not mean that we act on it (whether we intend to or not). Kind of like new year’s resolutions. We keep makingtradeoffs until the behavior we intended to engage in simply isnot part of our priorities anymore. Perry summarizesthese ideas into three realities that people need to grapplewith:
“Just because I’m aware doesn’t mean I care”.
“If we try to work against humannature, we will fail”.
ends up not being done.
For example, does everyone in IT conform to impeccable password hygiene (resetting itevery so often, having different passwords for different places, setting up multi-factor authentication etc)? Chances are, no. They too end up making tradeoffs(with time and effort mainly) and do the exact same thingthat other non-tech-savvy people may be judged for.
Cybercrime is on the rise. In particular, during COVID lockdowns, Perry’s company observed a spike in certain social engineering activitiessuch as phishing and cold calls that make a victim download malware or ransomware on their personal or organization computer systems.
In doing so, the vector thatmany cyber-criminals used was the COVID card by sending out malicious emails disguised as information andupdates about the virus or its vaccines, and sometimes adopting a more political tone. This allowed them to prey on This allowed them to prey on a reader’s emotions like fear, doubt, uncertainty, and political inclinations. Throughthese sensitive times and a greater threat of cyber-attacks, KnowBe4 was a source for businesses to help them navigate the confusing and rather dangerous social-digital landscape.
KnowBe4 is a security awareness firm. The objective is to train the end-user with regard to interacting with the computingenvironment in a way that mitigates the inherent risks that come with working withcomputers. For Perry, it is more about the behavior science behind users’ engagement with computers.
“What an employee does is way more important than what they know”.
Interestingly, in the case ofcybersecurity, IT folks tend to be some of the worst offenders when it comes to these ideas. A lot of the stuff that is preached
Another thing to note is that during COVID, people were working from home. Remote work translates to a higherrisk of hacking and cyber security breaches whichmakes it essential to follow data protection tips. Their
company’s internal networks (accessed through the personal computers) in a precarious position as well. Let’s suppose you have avirtual voice assistant device in your home (GoogleAssistant, Amazon Alexa, Siri, etc.) and you’re talking in ameeting in your living room discussing informationsensitive about mergers and acquisitions in your company. These devices would otherwise be excluded in such environments, but are present in your home-office setting. You could also have some physical documents or notes lying around (or perhaps a whiteboard) that others coming in and out of your house could read. Level this by adding other
could appear in the background of your partner’s work meeting or your child’svirtual classroom. How many people can now accessinformation that is meant to strictly stay within your company?
In short, flexible work now means that it is not just the digital environment that isgrounds for security breaches - your physical environment poses a risk as well.
moving to a remote or hybridenvironment, adjusting to good remote work practicesis of huge significance now. Businesses that do not offer flexible work fell victim to the great resignations and techtalent shortages. With such flexibility also comes more flexibility for hackers. Businesses should take appropriate measures and create the right kind of“security awareness” to protect their internal networks against cyberthreats.
WFH Is Here To Stay And We Have To Be Prepared Perry, like many others, is also of the view that remote work and work from home models of work will now be a normal part of our careers but we
In addition to trainingbusinesses to engage in (not just know) good securitypractices, KnowBe4 has more exciting things lined up forthe months ahead as well!
flexibility also comes more flexibility for hackers. Businesses should take appropriate measures and create the right kind of “security awareness” to protect their internal networks against cyberthreats.
In conversation with Mark Allen, John explains how his work over the years has helped companies with seed rounds: raise hefty Series B funding.
John speaking at the Alpha Wolves Summit in Warsaw, Poland.
With a record number of new unicorns and a fast-expanding investment tempo, globalVC financing broke new history last year. While this is good news for entrepreneursand the startup ecosystem, it also means that financing competition is fiercer thanever. That being said, While growth equity investors made record-breakinginvestments in high-growth, earlier-stage businesses last year, they have scaled back this year. Early-stage capital totaled $13.7 billion last month, down 22% from the $17.6 billion average monthly funding in 2021.
Venture Capital Trends 2022 Valuations will probably decline and the pace of investing will stall as late-stage investors reduce their commitment to private company investments. But it also means that many venture capitalists, who have recently raised record sums of money, now have the opportunity to compete forinvestments in the finest businesses at more affordable rates.
Sustainable investment
It is another trend that has gainedmomentum. Many people have been encouraged to invest in businesses that willhave a good influence on international relations, environmental issues, and, most importantly, public health challenges as a result of the recent trend of socio-political awareness in an era of global trouble. Sustainable investment is gaining popularityas investors start to understand that these results are not as unconnected as they may appear at first.
Consumers have always been curious about
new technologies that they may learn to use to better their lives. To assure efficiency and maintain their competitiveness, businesses continue to automation.employ
As a result of several firms and regularconsumers profiting from recent improvements within the industry, the fintech sector has recently experienced a rise in inmarket success.
John s Philosophy John is the Founding Partner at FF Venture Capital, a firm that started in 2008 and has been empowering founders and companies for 14 years. Prior to founding FF venture Capital, John worked at Goldman Sachs for 21 years in various roles. In conversation with Mark Allen, John explains how his work over the years has helped companies with seed rounds: raise hefty Series B funding.
We have over 14 years of data since starting in 2008 and while some would argue that that s not great, industryfigures show that only 10% of seed companies ever make itto a hundred million revenue…..Only 40% of companies found in a given year ever get to a hundredmillion revenue run rate and we have 6 of these companies in our portfolio with two more in the pipeline for hitting thatnumber this year
With a wave of digitalization in the last decade or so, there are a lot of emerging trends that have picked up hype from digital currencies to NFTs, to virtual reality and new realms in AI. According to john every sector has an exciting emerging trend so to speak and the main reason behind it is digitalization.
much be driven by emergingand upcoming trends.
John explains this by elaborating on what one of hisportfolio companies, Respo, is doing
“By taking an analog data set and digitalizing it, they cancreate a 3D point map of any game…even a game from1975”
He further explains that suchdata can then be used in a multitude of ways from realtime sports betting to training, scouting, healthcare,insurance, etc.
Speaking of digital currencies, since bitcoin is less regulatedthan traditional investment, venture capitalists havediscovered that it offers a
cryptocurrencies employ initial coin offerings (ICOs), which let businesses generatemoney using virtual currency. Both VCs and businesses searching for more adaptable investment or fundingmethods have found this approach to be highlysuccessful.
However, the price of bitcoin was $20,097 on June 20th; a 70% decline from its price in November. At its high inNovember, the price of Ethereum, a popular cryptocurrency, was over $4,800; now, it is less than $1,000. The price of bitcoin and other cryptocurrencies has been falling all year, and it has become worse since the Federal Reserve said it will
a time when the prospect of a recession is growing, what is happening to cryptocurrencyis, in part, an extreme version of what is happening toequities.
In conclusion,
companies found in a given year ever get to a hundred million revenue run rate and we have 6 of these companies in our portfolio with two more in the pipeline for hitting that number this year
What, Why, and How:
The great resignation is the talk of the town. Professionals are resigning, whilecompanies struggle to find talent to replace them. A very small poll done by our VP of engineering on LinkedIn (n=26) suggested that 85% of the respondents were facingskill shortages in their companies. While this sample size holds no statistical power, there are other samples that do. Of particular pertinence to us is the skill shortageprevalent in the tech industry. Gaper has to keep a close eye on these disequilibriums since, well, it is our job to help businesses create tech teams when they find it difficult to do so (whether due to skill shortage or any other reason). This article explores the recent decline in the availability of professionals in the cybersecurity niche - a very critical part of a lot of tech functions.
There are nearly 600,000 cybersecurity jobopenings in the US alone. This includes major government and corporate bodiesthat are quite literally facing an anti-hacker crisis.
In their 2021 report titled, “The Life and Times of Cybersecurity Professionals 2021”, ISSA/ESG describes the situation as a “downward, multi-year trend of bad to worse”. The survey they did lists down the following consequences of this problematic trend: 62% reported increased workload for the cybersecurity team 38% reported an increase in related vacancies 38% also reported a high burnout among staff 95% of the survey responses indicated that
the dearth in cybersecurity skills along with itsaccompanying consequences has remained unresolved 44% are of the opinion that the situation has actuallytaken a turn for the worse.
According to the report, there are also three main areas of cybersecurity that are affected by the skill shortage: -cloud computing security -security analysis and investigations -application security .
exist in the first place?
One would be inclined to think that the skill shortageexists because there are not enough people that possessthese skills. The problem however may lie at the end of the employers as well.
A major reason cited by the report is that perhaps this profession is grossly undervalued by the very people that demand it. 38% of the respondents to their survey felt that a lack of competitive compensation was a major reason why companies were failing to attract and keep professionals in this field. 33% of CISOs choose to leave one company for another because of better compensation packages.
Secondly, another factor cited by people that work in this field is the lack of learning opportunities offered by companies to their teams. 39% of respondents felt like better steps with regard to cybersecurity training couldbe taken. However, 21% of those surveyed did not complete the standard 40 hours of training in the year asnearly half of them could not afford to undertake it themselves.
The thing with cybersecurity is that professionals must continue to polish their skills as often as possible. What was in vogue last year is easy prey for malicious attackers this time. There are people whose past times and/or professional roles involve breaching the securityboundaries of other digital spaces. These parties are oneof the most resilient and determined actors of the internet world. If you find a way to tackle their mischief (and understated adjective), they will come up with another way to render your efforts fruitless. Cybersecurity, therefore, is one of the more difficult and unforgiving work areas to keep your skills relevant in.
To wrap these points up, the respondent data indicates that HR departments seem to have very little clue about what cybersecurity job rolesactually entail. This leads to poorly thought out hiringcriteria and recruitment processes. ISSA s report suggests that 29% of professionals in the fields findthat HR in their company is likely to reject skilledapplicants just because the department personnel do not have an appropriate understanding of the skillsetrequired. 25% also found that job advertisements forcybersecurity positions were impractical and expected anunreasonable level of experience, technical skill andcertifications from candidates.
We cannot expect the supply side to adjust itself toequilibrium if the demand side does not fix certain importantvariables that are under their control.
For starters, companies need to be more cognizant of the importance of cybersecurity talent i.e. compensate the critical nature of their work with competitive salary packages. Secondly, it wouldpay dividends in the long run if companies are open to some sort of skill-building investment at least once a year.
A major overhaul is also long due in the way that HR deals with cybersecurity positions. In addition to being taught toexpect a realistic level of skill and experience from applicants, HR departments
also need a better awareness of what the actual jobdescription should be and what the objective and goalsof these positions are.
And while the HR side of things is being revamped, itwould also help to allow cybersecurity teams to integrate better with other departments in the companythat include, but are not limited to, business development teams, directors, and the legal team.A little understanding and collaboration between these functions of a company actually goes a long way.
As a side note, we are at a point where tech personnel need to have a certain degreeof understanding about the business side of things, whilethose engaged in business
development activities also need to be aware of the nature of tech that their company engages with. It isno longer enough to have expertise in one area but be completely clueless about the other.
Conclusion
It seemed that companieswere able to make do with some reshuffling andredelegation of work when the skill shortage issue initiallybegan surfacing. However, now that the problem has ballooned enough to be considered a stand-alone threat, it is high time that founders and managers areprudent in their decisionmaking and adopt suitablehiring and working approaches that will be able
to sustain their businesses for years to come. This was a lesson that the pandemic had already taught us, yet theideas need to be reinforced in face of a second shockwhich was not as exogenous and unforeseen as the lockdowns. If you find yourself in need of a tech team or cybersecurity professionals, do not hesitate to set up a little call with Gaper.
Remote work is perhaps one of the best things that came out of the pandemic. Butalong with every good thing comes risks and cons. And perhaps the biggest risk ofremote working is Remote Hacking.
Working outside of a traditional office setting has several benefits. However,employees working from home could unintentionally endanger your company'sdata and networks. During the COVID-19 epidemic, companies and their employees had increasingly relocated their operations to the cloud, putting their networks at riskof intrusion. Companies were forced to quickly implement WFH policies that relied heavily upon cloud services like VPN, Remote Desktop Protocol and applications like Office 365 or Google Workspace.
This permitted employees to work outside the company network and increased cybercriminals' attack surface. This way, malicious hackers can take advantage ofthe lower level of monitoring activity and successfully compromise credentials –which are used to access cloud services remotely.
Data breaches, unprotected wi-ficonnections, and unattended PCs are some of the possible harmful consequences a firm may face when you add in an employee who works remotely and has limited technological expertise. This combo can make your organization vulnerable to cyber attacks.
However, it's easy to overlook the risks of
remote access when the perks are so appealing
Spending less money ontravel and office space is a huge benefit
Your employees can still complete their tasks even if they're sick at home
It's possible that your employees will be more productive in their own homes, away from the usual office distractions
You and your workers can work after regularbusiness hours.
Because of this, we will walk you through the variousdangers associated with remote access and the solutions to these problems.
What is Remote Access?
"Remote access" refers to the capacity to access a computer or network from aremote location. Remote access can be established via LAN, WAN, or VPN, all of which are types of virtual private networks.
For enterprises, remoteaccess services include a wide range of software andhardware solutions that make it possible to connect remotely. They're not safe, unfortunately.
Every day, more and more enterprises are making the switch to cloud-based storage. However, many people and company owners have not yet made the transition for a straightforward reason: they are concerned about their data privacy and safety.
Regarding security, having physical servers on-site has a few advantages. The data is not transmitted over the
Remote work has opened the door forscams, ransomware and other risks. Learn how to keep your data safe fromsuch breaches.
internet and is instead stored locally. Every piece of information you produce stays within your network.Your network's firewall protects your server onpremises from the outside world. Knowing you are incontrol of things provides you with peace and a sense of safety.
On the Cloud, security is a two-way street. One of the main advantages of using a Cloud server is that the service provider typically has the most advanced security measures.
However, the security of a cloud system is only as good as the firm that is using it. Abreach can occur despite the provider's extensive security procedures because of poor management on your part,even if the provider is diligent.
Your IT provider needs to establish security rules and ensure that all security devices are kept up to date to ensure the safety of your data. To avoid being hacked, itis necessary to implement password restrictions such as password encryption and lockouts. This is a list of policies that your IT provider must handle. As a result, youshould collaborate with the members of your IT department to choose a Cloud provider that lives up tothe standards.
develop new and inventive ways to gain access topeople's personal information and use it as leverage toextract ransom payments.
Can Hackers Remotely Access Your Computer? Hackers increasingly use RDP-based networks to access sensitive data through remote desktop hacks, such as passwords and system applications. Every day,
Your company must do everything possible regardingnetwork and system security to keep hackers at bay. RDP is a widely used solution in enterprises, yet the fact that it is so widely used is precisely what makes it susceptible to RDP hacking. Suppose you already useMicrosoft's RDP as a remote desktop or remote support solution. In that case, you must have a solid understanding of the potential dangers and theother available options.
Your IT provider needs to establish security rules and ensure that all security devices are kept up to date to ensure the safety of your data.To avoid being hacked, it is necessary to implement password restrictions.
Employees typically use their own devices to access the business network when working from home Due to the lack of corporate laptops, many employees are e posed to security threats.
VPNs and single sign-on solutions with encrypted tokens are commonplace in companies with a strongfocus on cybersecurity, as they ensure that all devices accessing a company's network are protected However, the average individual does not consider encrypting their devices or using a VPN to access the internet at home, even if they merely check their work voicemails.
Personal computers tend to be less secure than those used in the workplace Therefore, the securityelements that the vast majority of employeesconsider to be a norm, such as email filtering, encryption,and firewalls, may not be available, and corporate security e perts may not have any supervision into what is happening In the absence of this additional security, these personal gadgets could be used by hackers to gainaccess to business networks
Un ncrypt Fil Sharing Companies might haveencryption policies for the data stored on their networks, but they might not consider using encryption for the data
when it is moving from one system to another Thisincludes email solutions and cloud-based file-sharingservices provided by a third party Because employees e change a great deal of sensitive information regularly, ranging from customer data to confidential product information, businesses cannot afford to use file-sharing solutions or services that do not employ encryption Theft of information can result in ransomware attacks, other theft, and an increased risk to one's reputation
Lack of Comput r Insp ction Many software solutions for remote access don't check the remote device for viruses or malware Anyone with remote access to your office network might infect yourcompany's servers by using an infected PC at home or work.
Remote workers who use their own devices to access the corporate network face significant Companieschallenges often overlook the security of their employees' networks, particularly their home WiFi network, which is vulnerable to cyber-attacks Many individuals neglect theirWiFi routers regarding personal devices and their security As with any other hardware, this needs updatingand maintenance, yet most people don't give it a secondthought Security holes in outdated routers can be e ploited by hackers, which can lead to data breaches in
the in the long run People who keep the default router password and do not routinely reset it leave themselves vulnerable to hackers, who e ploit this loophole toinfiltrate their network
Phishing Emails Email phishing is the mostcommon method of delivering malware and other hackingtechniques, and it's working There were 66% of phishingattacks in the UK last year, and 30% of those attacks resulted in malware infections for the organi ations surveyed.
People's an ieties and emotions are frequently e ploited in phishing attacksto persuade users to download malicious attachments or click on links that lead to spoof sites The cons trick users into handing over their login information ordownloading malicious software that grants theperpetrators access to the computer in question These emails have gotten so sophisticated that it is becoming increasingly difficult for employees to detect them, particularly if they manage to get past thecorporate email filters into their inbo es
A username and password are often all that's required for remote access endpoints to connect to your network This single sign-on method is ahuge problem because most individuals use passwordsthat can be hacked
accidentally engage in risky activities, such as connecting to an unprotected Wi-Fi network, browsing malicious websites, and downloadingdangerous software
Because of these actions, hackers can infect your device using aman-in-the-middle attack or other forms of hacking.
From Remote Hacking
Today's digital environment enables workers to do their duties from virtually any location; however, this does not mean that businesses are forced to put their data, information, or systems in danger By preventativetakingmeasures, firms and their remote workers can have greater confidence in their remote security and close the door on any hackers who mightbe interested in taking advantage of them.
So, what are the best practices for guarding against and resolvingremote access security issues?
Nearshoring may help you get more affordable teams
By putting the following recommendations into action
Set up a VPN A virtual private network, or VPN, is essential when
attempting to remotely access sensitive data safely.There are several different VPNs that you should befamiliar with and think about using for your business. Inmost cases, a virtual private network (VPN is already included in business-grade firewall that you employ. Also, many IT organizations that provide network managementservices give top-of-the-line VPNs
However, a VPN can still be bypassed if the end-user adopts harmful habits such as using weak passwords
The first step in limitingremote access threats is selecting a appropriatefirewall for your organization's size, scope, andscale. Ensure your firewall is equipped with built-inantivirus, anti-malware, and high-availability software and programmes
Companies can use filesharing platforms likeWeTransfer, Dropbox, and OneDrive to ensure that their remote workers' files and data are safe and secure. Organizations that want to send and receive an encrypted email can use HushMail, ProtonMail or a VPN to keep all correspondence on the corporate network. Although the particulars may change depending on thedeployment, most virtual private networks (VPNsfeature end-to-end encryption options
A breach of your system could lead to the theft of your login credentials. That's aterrible thought, but you can take steps to reduce the valueof that information to hackers. It's called two-factor authentication and requires you to input a one-time password to authenticate logging in after you submityour user credentials.
Implementation of multifactor authentication can improve The traditional single sign-on technique effectively.
It's possible to go a stepfurther and ask your outside vendors to contact your operations department to obtain a one-time passcode for remote access to your data. You may utilise eye or fingerprint scanning as a high-tech option forauthenticating your identity.
A hacker can't get into your bank account or your company's payroll system just by obtaining your password ifsuch features are activated. It's an additional step, but it'sone of the most successful ways to block intruders. When using oogle and Microsoft cloud services, you mayenable two-factor authentication and check out additional alternatives to ensure your accounts are safe
Most hacking assaults begin with a maliciousemail, or "phishing," which Microsoft saysaccounts for 91% of cyberattacks.
To limit the risk caused by phishing emails, training employees on how to identify and prevent them is crucial. To guaranteethat everyone is informed, it ought to be put intopractice for both the currently employed and the newly hired. Phishing detection is an area where companies need to keep their employees up-to-date on the newest trends and threats. More than half of UK companies (52% conduct quarterly security training for their employees, which is higher than the global average (41%
one of the most promising artificial intelligence companies by Forbes in 2020.
There’s a certain infographic doing rounds on social media that shows the top contributors to the US economy by Unicorn founders and their respective countries. As is natural, when I first came across this post my eyes went searching for a green flag because even at any given moment I can count at least 5 founders whose startups hit unicorn status and who were or are originally from Pakistan. Sadly, the post had no mention of Pakistan at all.
This may or may not be coming from a place of patriotism but more importantly, it pains me to see an entire community with so much potential getting left out due to either a lack of research or just plain ignorance. Careem for example, though not originally a US-based startup, got acquired by Uber and has been since contributing to the US economy in one way or the other. So I gathered my team (yes, I am this extra) and compiled a list of 14 startups in the last 15–20 years that have reached unicorn status at least once and were co-founded by Pakistani founders.
Before I mention the list, this is probably just the surface that we have managed to scratch in a few hours so please feel free to reach out if you know someone who deserves to be on this list.
2. Afiniti Afiniti hit unicorn status in 2017 being valued at $1.6 billion. Founded by Zia Chisti, Afiniti is developing AI specifically for call centers. Their technology focuses on identifying patterns in conversations and using AI and Machine learning to optimize pairings for better outcomes
reach more customers and build better brands. It was cofounded by Omair Tariq in 2020 and had to date raised $383 million in funding.
6. Chegg Chegg was co-founded by Osman Rashid in 2005 and is valued at $2 billion as of 2022. They are an education technology company focused on textbook solutions and providing other tutoring and student support services.
7. Motive
3. FireEye (now Trellix) Founder Ashar Aziz created FireEye as a virtual machine introspection tool to assist users in safeguarding their networks from viruses that would have otherwise gotten past conventional signaturebased protections. It hit unicorn status in 2004 with a market cap of $3.2 billion.
Motive is focused on businesses that power the physical economy. They are working on technologies that help these businesses be more secure and profitable. Motive was co-founded by Shoaib Makani in 2013 and is a unicorn that was valued at $1.4 billion in 2019.
8. Mercury
4. Cavium (Bought by Marvel) Cavium was co-founded in 2000 by Raghib Hussain and offers integrated semiconductor processors for networking, communications, storage, wireless, security, video, and linked home and office applications. It was acquired by Marvel in 2018 with their market cap increasing to $5.032 billion between 2009 and 2018.
Simply put, Mercury is the bank for startups. They provide virtual and physical debit cards and custom-made tools to help startups scale, currency exchange, etc. It was co-founded by Immad Akhund in 2017. Mercury was valued at $1.62 billion in 2021.
9. Temporal
5. Cart.com Cart.com helps and empowers brands to scale by providing them with tools and a seamless data-rich approach to allow them to
Temporal technologies was founded in 2019 and one of the co-founders in Samar Abbas. They have created an open-source microservices orchestration platform for building and running resilient applications. They hit unicorn status in 2022 with a $1.5
billion valuation.
10. Applied Intuition
Co-founded by Qasar Younis in 2017, Applied Intuition reached a valuation of $1.25 billion in 2020 for its Autonomous vehicle testing software. They specialize in software infrastructure that powers autonomous vehicles and driver assistance systems.
by Zia Chisti is Aligntech which focuses on manufacturing 3D digital scanners and Invisalign used in orthodontics.
13. Careem Careem was acquired by Uber for a whopping $3.1 billion in 2019. The co-founder, Mudassar Sheikha is originally from Karachi Pakistan.
Zameen.com, was valued at more than $1 billion. As a result, after Afiniti and KeepTruckin, the combined company became the third unicorn founded by Pakistani entrepreneurs.
11. Stacks Muneeb Ali is the co-founder of Stacks, a platform for opensource Bitcoin smart contracts. A startup developing the Stacks technology called Blockstack PBC raised over $75 million through a combination of venture money and token sales.
14. Sonus Hassan Ahmed created Sonus Networks in 1996. Sonus Networks went public in May 2000 and had its peak market value of $15.4 billion in July 2000. Ahmed departed Sonus in 2008 when it had a value of $430 million.
15. Zameen.com
12. Aligntech
Another startup co-founded
According to data from Forbes as of December 2021, Emerging Markets Property Group, the parent company of
Software companies that employ the Agile technique, which ensures a speedier product launch, are perfect. Instead of long-term planning, this flexible technique allows for immediate user feedback.
Your IT provider needs to establish security rules and ensure that all security devices are kept up to date to ensure the safety of your data.To avoid being hacked, it is necessary to implement password restrictions.