Quality Stocks

Quality Stocks

Share this post

Quality Stocks
Quality Stocks
Cybersecurity, the Digital Battlefield
Copy link
Facebook
Email
Notes
More
Research and Analysis

Cybersecurity, the Digital Battlefield

Description, outlook and screening of the main players

Quality Stocks's avatar
Quality Stocks
Apr 13, 2024
∙ Paid
22

Share this post

Quality Stocks
Quality Stocks
Cybersecurity, the Digital Battlefield
Copy link
Facebook
Email
Notes
More
8
Share

Cybersecurity is one of the most interesting sectors on the stock market. The growing threat of cyber-attacks and increasing digitalization make it a buoyant market. The applications are both civil and military, as the recent conflict in Ukraine clearly illustrated. But the market is also interesting because it is in constant motion, both financially and technologically.

In this article, we will describe the world of cybersecurity. We will identify its prospects and then analyze 36 interesting players. For each, we will use our rating system to give a note in each of the following categories: growth, quality, valuation and shareholder. This will allow to identify the best investments depending on your investment style.

Sector analyses require a lot of work. If you like them, here are 3 others available: cosmetics, video games and electric vehicles. If you are interested in the cybersecurity sector here is a deep dive of Palo Alto Networks.

And without further ado, let's start our exploration!

Quality Stocks is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

The different types of cybersecurity and threats

Cybersecurity is not a homogeneous sector. It is multifaceted. Among the different types of segmentation, we will highlight 9:

  • Network security. Network security is safeguarding computer networks from various types of cyber attacks. There are different tools: firewalls, security information and event management (SIEM) tools, virtual private networks (VPNs), network segmentation, sandboxing, and intrusion prevention systems.

  • Information security. Information security focuses on keeping digital information safe. Some measures, including digital signatures, encryption, access control, security awareness training, and data backup and recovery, are highly effective in mitigating potential security breaches and other threats.

  • Application security. Application security protects mobile applications, web applications, and other software programs from cyber intrusions.

  • Cloud security. Cloud security refers to protecting sensitive data in the cloud environment. This concept tries to mitigate risks related to storage and system security in the cloud.

  • Endpoint security. Endpoint security is a concept that responds to cyber threats against individual devices such as mobile devices, servers, desktops, and laptops. Businesses or organizations enhance the security posture by implementing security measures, including Endpoint Protection Platforms (antivirus, anti-malware), Mobile Device Management (MDM) for mobile devices, and Endpoint Detection and Response (EDR).

  • Mobile security. Mobile security concentrates on protecting mobile devices and preventing mobile threats.

  • IoT security. IoT is often a weak point in a network. IoT security aims to protect IoT devices. Implementing basic measures such as a strong password policy, regular updates, and changing default settings can ensure IoT security.

  • Critical infrastructure security. It is the precautions to ensure essential assets that are vital and directly affecting daily life. After identifying the inventory of critical assets, implementing some measures, such as access management, continuous monitoring, improving resilience and recovery plan, managing supply chain, and network segmentation, can enhance critical infrastructure security.

  • Zero trust security. The Zero Trust model never trusts by default and always requires verification before granting access to sensitive data.

Threats can take many forms as we can see on this infographic. From social engineering to phishing.

Source: projectcubicle.com

However, a recurring element appears: human. According to a study by IBM, human error is the main cause in 95% of cyber security breaches. This leads to a first conclusion: the best cybersecurity investment is user training!

The stakes of cybersecurity

The first stake, and maybe the most understable, is the cost of cybersecurity. The global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028.

Source: Statista

The source of the costs are: damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm.

Beyond cost, cybersecurity has become part of the arsenal in geopolitical conflicts, both in “peaceful time” for spying, business intelligence, technological theft and in war time.

As an example, according to a report from the Cyber Peace Institute, between January 2022 and September 2023, the conflict in Ukraine generated:

  • 574 cyber attacks targeting Ukraine

  • 306 cyber attacks targeting Russia

  • 1,896 cyber attacks targeting third countries (mainly Poland, Lithuania, Germany and the USA)

The targets were various. Among them, we can find public administrations, banks and companies/organizations from different sectors (transportation, administration or media).

The goals of these cyberattacks were:

  • Disruption

  • Data theft

  • Disinformation

  • Destruction

As more and more critical systems go online, it is easy to see how important cybersecurity is to modern warfare.

Marketshare and consolidation

The security appliance vendor market is slowly consolidating.

Source: Statista

But it remains highly fragmented. This consolidation will be accentuated by the customers pursuing a vendor consolidation strategy to limit the number of software in their IT architectures and therefore reduce cost.

Source: Fortinet Investor Presentation

This consolidation will give some advantages to the company with huge financial capabilities and strong execution, basically the leaders.

Market outlook and CAGR

Before looking at the 36 interesting cybersecurity stock (including their score in the 5 categories: growth, quality, valuation, shareholder, market), let’s take a look at the estimated market size by 2030 to identify the long-term growth potential.

Keep reading with a 7-day free trial

Subscribe to Quality Stocks to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Quality Stocks
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More