{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T07:41:01Z","timestamp":1764229261004,"version":"3.46.0"},"reference-count":32,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:00:00Z","timestamp":1762387200000},"content-version":"vor","delay-in-days":309,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Early-stage firms play a crucial role in driving innovation and developing new products and services, particularly in the field of cybersecurity. Therefore, evaluating their performance is vital for investors and policymakers. This work presents a financial evaluation of early-stage firms\u2019 performance in 19 cybersecurity sectors using a private-equity dataset from 2010 to 2022 retrieved from Crunchbase. We compare cybersecurity sectors regarding the amount raised over funding rounds and post-money valuations while inferring missing observations with a machine-learning method. We observe significant investor interest variations across categories, periods, and locations. In particular, we find the average capital raised (valuations) to range from USD 7.24 mln (USD 32.39 mln) for spam filtering to USD 45.46 mln (USD 447.22 mln) for the private cloud sector. We additionally find that the entire cybersecurity sector is both underfunded and undervalued with respect to the broader information technology sector. Next, we assume a log process for returns computed from post-money valuations and estimate the expected returns, systematic and specific risks, and risk-adjusted returns of investments in early-stage firms belonging to the cybersecurity sector. Again, we observe substantial performance variations with annualized expected returns ranging from 9.72% for privacy to 177.27% for the blockchain sector. Whereas expected returns on the cybersecurity sector are on par with those of other sectors, its systematic risk is lower, indicating a contra-cyclical nature. By estimating the performance of cybersecurity investments, we shed light on variations in market expectations across cybersecurity sectors and compared to other sectors.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf032","type":"journal-article","created":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T05:54:11Z","timestamp":1762667651000},"source":"Crossref","is-referenced-by-count":0,"title":["Are cybersecurity firms different? Intra-sector and cross-industry comparisons of financial performance"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8039-5097","authenticated-orcid":false,"given":"Lo\u00efc","family":"Mar\u00e9chal","sequence":"first","affiliation":[{"name":"Institute of Entrepreneurship & Management, University of Applied Sciences , HES-SO Valais-Wallis - 3960, Sierre ,","place":["Switzerland"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6471-772X","authenticated-orcid":false,"given":"Alain","family":"Mermoud","sequence":"additional","affiliation":[{"name":"Cyber-Defence Campus\u2014Armasuisse, Science and Technology \u00a0 - 1015, Lausanne ,","place":["Switzerland"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9393-1490","authenticated-orcid":false,"given":"Dimitri","family":"Percia\u00a0David","sequence":"additional","affiliation":[{"name":"Institute of Entrepreneurship & Management, University of Applied Sciences , HES-SO Valais-Wallis - 3960, Sierre ,","place":["Switzerland"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5046-1727","authenticated-orcid":false,"given":"Mathias","family":"Humbert","sequence":"additional","affiliation":[{"name":"University of Lausanne Department of Information Systems, HEC Lausanne, \u00a0 - 1015, Lausanne ,","place":["Switzerland"]}]}],"member":"286","published-online":{"date-parts":[[2025,11,6]]},"reference":[{"key":"2025112702372979600_bib1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jfineco.2004.03.006","article-title":"The risk and return of venture capital","volume":"75","author":"Cochrane","year":"2005","journal-title":"J Financ Econ"},{"key":"2025112702372979600_bib2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jfineco.2018.04.015","article-title":"Squaring venture capital valuations with reality","volume":"135","author":"Gornall","year":"2020","journal-title":"J Financ Econ"},{"key":"2025112702372979600_bib3","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1356322","article-title":"A new model of venture capital risk and return","author":"Ewens","year":"2009"},{"key":"2025112702372979600_bib4","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1111\/jofi.12390","article-title":"Risk-adjusting the returns to venture capital","volume":"71","author":"Korteweg","year":"2016","journal-title":"J Financ"},{"key":"2025112702372979600_bib5","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1257\/00028280260344452","article-title":"The returns to entrepreneurial investment: A private equity premium puzzle?","volume":"92","author":"Moskowitz","year":"2002","journal-title":"Am Econ Rev"},{"article-title":"European venture capital: Myths and facts","year":"2015","author":"Axelson","key":"2025112702372979600_bib6"},{"key":"2025112702372979600_bib7","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1111\/j.1540-6261.2012.01788.x","article-title":"Private equity performance and liquidity risk","volume":"67","author":"Franzoni","year":"2012","journal-title":"J Financ"},{"key":"2025112702372979600_bib8","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1017\/S0022109012000221","article-title":"A new method to estimate risk and return of nontraded assets from cash flows: The case of private equity funds","volume":"47","author":"Driessen","year":"2012","journal-title":"J Financ Quant Anal"},{"key":"2025112702372979600_bib9","doi-asserted-by":"publisher","first-page":"1751","DOI":"10.1111\/jofi.12688","article-title":"Estimating private equity returns from limited partner cash flows","volume":"73","author":"Ang","year":"2018","journal-title":"J Financ"},{"key":"2025112702372979600_bib10","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.jempfin.2010.09.002","article-title":"Fund size, limited attention and valuation of venture capital backed firms","volume":"18","author":"Cumming","year":"2011","journal-title":"J Empir Financ"},{"key":"2025112702372979600_bib11","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1016\/j.jempfin.2009.11.001","article-title":"Local bias in venture capital investments","volume":"17","author":"Cumming","year":"2010","journal-title":"J Empir Financ"},{"key":"2025112702372979600_bib12","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.jempfin.2006.03.004","article-title":"Firm-level implications of early stage venture capital investment - An empirical investigation","volume":"14","author":"Engel","year":"2007","journal-title":"J Empir Financ"},{"key":"2025112702372979600_bib13","doi-asserted-by":"publisher","first-page":"3738","DOI":"10.1093\/rfs\/hhq050","article-title":"Risk and return characteristics of venture capital-backed entrepreneurial companies","volume":"23","author":"Korteweg","year":"2010","journal-title":"Rev Financ Stud"},{"key":"2025112702372979600_bib14","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.281804","article-title":"Building a venture capital index","author":"Peng","year":"2001"},{"key":"2025112702372979600_bib15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2202\/1538-0645.1180","article-title":"An index for venture capital, 1987\u20132003","volume":"4","author":"Hwang","year":"2005","journal-title":"Contrib Econ Anal Policy"},{"issue":"1","key":"2025112702372979600_bib16","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3905\/jai.2006.640265","article-title":"Private equity versus stocks","volume":"9","author":"Schmidt","year":"2006","journal-title":"J Alternative Investments"},{"key":"2025112702372979600_bib17","doi-asserted-by":"publisher","first-page":"3515","DOI":"10.1016\/j.jbankfin.2013.04.010","article-title":"Private equity benchmarks and portfolio optimization","volume":"37","author":"Cumming","year":"2013","journal-title":"J Bank Financ"},{"key":"2025112702372979600_bib18","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1016\/j.jempfin.2012.08.004","article-title":"Nonlinearity and smoothing in venture capital performance data","volume":"19","author":"McKenzie","year":"2012","journal-title":"J Empir Financ"},{"issue":"3","key":"2025112702372979600_bib19","doi-asserted-by":"publisher","first-page":"57","DOI":"10.3905\/jai.2023.1.202","article-title":"TechRank","volume":"26","author":"Mezzetti","year":"2024","journal-title":"J Alternative Investments"},{"key":"2025112702372979600_bib20","doi-asserted-by":"publisher","first-page":"116","DOI":"10.3905\/jpm.2024.1.611","article-title":"The new risk and return of venture capital","volume":"50","author":"Burguet","year":"2024","journal-title":"J Portfolio Manage"},{"article-title":"Historical Company Data","year":"2022","author":"\u2018Crunchbase, Inc. \u2019","key":"2025112702372979600_bib21"},{"article-title":"Crunchbase research: monitoring entrepreneurship research in the age of big data","year":"2021","author":"Besten\u00a0den","key":"2025112702372979600_bib22"},{"article-title":"Using Crunchbase for economic and managerial research","year":"2017","author":"Dalle","key":"2025112702372979600_bib23"},{"issue":"1","key":"2025112702372979600_bib24","doi-asserted-by":"publisher","first-page":"71","DOI":"10.3917\/fina.391.0071","article-title":"Round-number bias in investment: Evidence from equity crowdfunding","volume":"39","author":"Herv\u00e9","year":"2018","journal-title":"Finance"},{"key":"2025112702372979600_bib25","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1007\/s11187-011-9337-4","article-title":"Social capital of venture capitalists and start-up funding","volume":"39","author":"Alexy","year":"2012","journal-title":"Small Bus Econ"},{"article-title":"Auto-Sklearn 2.0: Hands-free AutoML via meta-learning","year":"2021","author":"Feurer","key":"2025112702372979600_bib26"},{"key":"2025112702372979600_bib27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyy006","article-title":"A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate","volume":"4","author":"Agrafiotis","year":"2018","journal-title":"J Cybersecur"},{"key":"2025112702372979600_bib28","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.cose.2015.11.001","article-title":"Taxonomy of information security risk assessment (ISRA)","volume":"57","author":"Shameli-Sendi","year":"2016","journal-title":"Comput Secur"},{"article-title":"Framework for improving critical infrastructure cybersecurity","year":"2018","author":"\u2018National Institute of Standards and Technology, (NIST)\u2019","key":"2025112702372979600_bib29"},{"key":"2025112702372979600_bib30","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cose.2016.10.009","article-title":"Introducing cybernomics: a unifying economic framework for measuring cyber risk","volume":"65","author":"Ruan","year":"2017","journal-title":"Comput Secur"},{"key":"2025112702372979600_bib31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/sym14040683","article-title":"Systematic review on identification and prediction of deep learning-based cyber security technology and convergence fields","volume":"14","author":"Hwang","year":"2022","journal-title":"Symmetry"},{"key":"2025112702372979600_bib32","doi-asserted-by":"publisher","first-page":"107226","DOI":"10.1016\/j.jaccpubpol.2024.107226","article-title":"Empirical evidence on disclosing cyber breaches in an 8-K report: Initial exploratory evidence","volume":"46","author":"Gordon","year":"2024","journal-title":"J Account Public Policy"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf032\/65235214\/tyaf032.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf032\/65235214\/tyaf032.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T07:37:46Z","timestamp":1764229066000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf032\/8315891"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf032","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf032"}}