Get the latest crypto news, updates, and reports by subscribing to our free newsletter.
Giấy phép số 4978/GP-TTĐT do Sở Thông tin và Truyền thông Hà Nội cấp ngày 14 tháng 10 năm 2019 / Giấy phép SĐ, BS GP ICP số 2107/GP-TTĐT do Sở TTTT Hà Nội cấp ngày 13/7/2022.
© 2026 Index.vn
Cybersecurity investors are increasingly focusing on identity and access security as stolen credentials continue to circulate at scale. The dark web is estimated to have more than 24 billion compromised username and password combinations, which the article frames as roughly three stolen credentials for every person globally—an exposure attackers can monetize without needing to execute sophisticated intrusions.
The article argues that attackers can increasingly bypass complex hacking by purchasing reused employee passwords “for pennies,” reducing the barrier to monetizing corporate data theft. This dynamic is pushing IT teams to move beyond traditional perimeter defenses.
According to the article, Gartner’s latest cybersecurity projections indicate that IT departments are abandoning legacy perimeter approaches and pivoting toward zero-trust architectures and continuous identity verification to protect internal networks.
As organizations tighten identity controls, the article highlights a broader reallocation of capital toward enterprise identity-security platforms. It also notes that modern corporate perimeters now extend beyond office networks to personal devices and home networks, increasing the importance of endpoint hygiene and off-network employee behavior.
The article says enterprises increasingly rely on measures such as enforcing multi-factor authentication, auditing home network configurations, and requiring staff to use secure password managers. The goal is to reduce the risk that human error or a compromised personal account undermines zero-trust infrastructure.
For investors seeking diversified exposure to the cybersecurity theme, the article points to two exchange-traded options.
The article cautions that buying the sector broadly can be risky due to stretched valuations among some legacy network players. It argues that the most forward-looking opportunity is concentrated in identity infrastructure and zero-trust providers, particularly as the market intensifies efforts to secure the “human element” without disrupting enterprise workflows.
In weighing growth versus valuation, the article highlights several cybersecurity names:
The article frames the current environment as an upgrade cycle driven by the need to reduce credential theft and improve identity security. It suggests that companies capable of securing employee access and endpoint behavior—without disrupting day-to-day operations—may capture a larger share of IT budget expansions over the next 24 months.
Premium gym chains are entering a “golden era” that is ending or already in decline, as rising operating costs collide with shifting consumer preferences toward more flexible, community-based ways to exercise. Long-term memberships are shrinking, margins are pressured by higher rents and facility expenses, and competition from smaller, more personalized…