{"id":19396,"date":"2026-03-20T09:57:31","date_gmt":"2026-03-20T09:57:31","guid":{"rendered":"\/cybersecurity-blog\/?p=19396"},"modified":"2026-03-20T09:57:32","modified_gmt":"2026-03-20T09:57:32","slug":"anyrun-harvest-cyber-150-2026","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/","title":{"rendered":"ANY.RUN Enters IT-Harvest\u2019s 2026 Cyber 150 for Fast Growth and Industry Impact\u00a0"},"content":{"rendered":"\n<p>We\u2019re&nbsp;thrilled to announce that&nbsp;<a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-harvest-cyber-150-2026&amp;utm_term=200326&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&nbsp;has once again been recognized in IT-Harvest\u2019s 2026 Cyber 150, a list of the fastest-growing cybersecurity companies. Receiving this recognition&nbsp;<strong>for the second year in a row<\/strong>&nbsp;makes this moment especially meaningful and reflects the strong progress our company made over the past year.&nbsp;<\/p>\n\n\n\n<p>It also points to a broader shift in the market. Organizations are placing greater value on technologies that help security teams work faster, investigate with more confidence, and respond to threats with clearer evidence. ANY.RUN is proud to be part of that change!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Among the Industry\u2019s Fastest-Growing Companies&nbsp;<\/h2>\n\n\n\n<p>IT-Harvest is a cybersecurity analyst firm known for tracking the industry through data and market research. Its&nbsp;<a href=\"https:\/\/world.einnews.com\/pr_news\/michigan\/898255352\/it-harvest-announces-the-2026-cyber-150-the-fastest-growing-cybersecurity-companies\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber 150<\/a>&nbsp;focuses on vendors that are gaining traction, expanding their presence, and earning attention in a highly competitive space.&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>\u201c<em>By\u00a0analyzing\u00a0thousands of vendors and sorting by measurable growth, we can identify the companies that are emerging as the next leaders of cybersecurity.\u201d<\/em><\/p><cite>Richard\u00a0Stiennon, founder and chief research analyst of IT-Harvest\u00a0<\/cite><\/blockquote><\/figure>\n\n\n\n<p>That is what makes this so important to us: it is not only about growth, but also about being seen as a company contributing to where cybersecurity is heading.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Turning Progress&nbsp;into&nbsp;Real Customer Impact&nbsp;<\/h2>\n\n\n\n<p>Over the past year, a lot has changed at ANY.RUN. The team has worked hard to expand the company\u2019s malware analysis and threat intelligence solutions with new capabilities and stronger functionality designed to meet the growing demands of modern security teams.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"415\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Infographic-ANY.RUN_-2048x829-1-1-1024x415.png\" alt=\"\" class=\"wp-image-19405\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Infographic-ANY.RUN_-2048x829-1-1-1024x415.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Infographic-ANY.RUN_-2048x829-1-1-300x121.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Infographic-ANY.RUN_-2048x829-1-1-768x311.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Infographic-ANY.RUN_-2048x829-1-1-1536x622.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Infographic-ANY.RUN_-2048x829-1-1-370x150.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Infographic-ANY.RUN_-2048x829-1-1-270x109.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Infographic-ANY.RUN_-2048x829-1-1-740x300.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Infographic-ANY.RUN_-2048x829-1-1.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Achieving the mentioned results with the help of ANY.RUN\u00a0<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>That work has led to&nbsp;real results&nbsp;for customers. Organizations using ANY.RUN report faster investigations, lower operational pressure, and more efficient workflows across the entire SOC. Among the outcomes shared by customers are:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>95% of SOC teams\u00a0using ANY.RUN\u00a0speed up threat investigations\u00a0<\/li>\n\n\n\n<li>Less alert fatigue thanks to instant threat insights that support faster decision-making\u00a0<\/li>\n\n\n\n<li>Reduced potential breach costs through earlier threat detection and more informed response\u00a0<\/li>\n\n\n\n<li>Up to 20% decrease in Tier 1 workload, 30% reduction in Tier 1 to Tier 2 escalations\u00a0<\/li>\n\n\n\n<li>Lower infrastructure costs by removing hardware setup expenses with cloud-based solutions\u00a0<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nFaster\u00a0decisions across <span class=\"highlight\">your entire SOC<\/span><br>\n<span class=\"highlight\">Drive confidence\n<\/span>  from triage to response\u00a0\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=anyrun-harvest-cyber-150-2026&#038;utm_term=200326&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nUpgrade your SOC\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>This progress is what makes recognition like this especially meaningful. Behind the award is a year of product growth, continuous improvement, and tangible value delivered to the teams who rely on ANY.RUN every day.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Expanding Influence Across the Cybersecurity Industry&nbsp;<\/h2>\n\n\n\n<p>Being\u00a0included\u00a0in the list of\u00a0the fastest-growing cybersecurity companies is another sign of how much ANY.RUN has grown and how much more visible the company has become across the market.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"459\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-20-at-10.40.40-1024x459.png\" alt=\"\" class=\"wp-image-19412\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-20-at-10.40.40-1024x459.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-20-at-10.40.40-300x134.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-20-at-10.40.40-768x344.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-20-at-10.40.40-1536x688.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-20-at-10.40.40-2048x917.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-20-at-10.40.40-370x166.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-20-at-10.40.40-270x121.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-20-at-10.40.40-740x331.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN solutions are trusted by industry leaders<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>Today, more than 600,000 analysts and 15,000 organizations worldwide use&nbsp;our&nbsp;malware analysis and threat intelligence solutions as part of their daily security workflows.&nbsp;<\/p>\n\n\n\n<p>That growth is also reflected at the enterprise level, where 74% of Fortune 100 companies rely on ANY.RUN in their security operations. Together, these numbers show that ANY.RUN is&nbsp;gradually&nbsp;becoming&nbsp;arecognized name across the cybersecurity industry.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Thank You for Being Part of This Journey&nbsp;<\/h2>\n\n\n\n<p>We are grateful to our customers, partners, and community for being part of this journey. Your trust, support, and feedback continue to shape the way ANY.RUN grows, evolves, and moves forward.&nbsp;<\/p>\n\n\n\n<p>We will continue building and improving our solutions with the same focus on helping security teams meet new challenges with greater speed, clarity, and confidence.&nbsp;<\/p>\n\n\n\n<p>There is much more ahead;&nbsp;excited to share the next chapter of ANY.RUN with you!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-harvest-cyber-150-2026&amp;utm_term=200326&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&nbsp;delivers interactive malware analysis and actionable threat intelligence used by security teams around the world to investigate threats faster, understand attacker&nbsp;behavior&nbsp;more clearly, and respond with greater confidence.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-harvest-cyber-150-2026&amp;utm_term=200326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>,&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-harvest-cyber-150-2026&amp;utm_term=200326&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a>, and&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-harvest-cyber-150-2026&amp;utm_term=200326&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>&nbsp;help SOC and MSSP teams&nbsp;analyze&nbsp;threats faster, investigate incidents with deeper context, and detect emerging attacks earlier.&nbsp;<\/p>\n\n\n\n<p>ANY.RUN is&nbsp;<a href=\"https:\/\/any.run\/compliance\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-harvest-cyber-150-2026&amp;utm_term=200326&amp;utm_content=linktocompliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2 Type II certified<\/a>, reinforcing its commitment to protecting customer data and&nbsp;maintaining&nbsp;strong security controls.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re&nbsp;thrilled to announce that&nbsp;ANY.RUN&nbsp;has once again been recognized in IT-Harvest\u2019s 2026 Cyber 150, a list of the fastest-growing cybersecurity companies. Receiving this recognition&nbsp;for the second year in a row&nbsp;makes this moment especially meaningful and reflects the strong progress our company made over the past year.&nbsp; It also points to a broader shift in the market. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":19407,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-19396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN Enters IT-Harvest\u2019s 2026 Cyber 150 for the Second Time in a Row<\/title>\n<meta name=\"description\" content=\"ANY.RUN has been recognized by IT-Harvest in the 2026 Cyber 150 for the second year in a row, highlighting the company\u2019s growth and industry momentum.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN Enters IT-Harvest\u2019s 2026 Cyber 150 for Fast Growth and Industry Impact\u00a0\",\"datePublished\":\"2026-03-20T09:57:31+00:00\",\"dateModified\":\"2026-03-20T09:57:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/\"},\"wordCount\":726,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/\",\"name\":\"ANY.RUN Enters IT-Harvest\u2019s 2026 Cyber 150 for the Second Time in a Row\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2026-03-20T09:57:31+00:00\",\"dateModified\":\"2026-03-20T09:57:32+00:00\",\"description\":\"ANY.RUN has been recognized by IT-Harvest in the 2026 Cyber 150 for the second year in a row, highlighting the company\u2019s growth and industry momentum.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN Enters IT-Harvest\u2019s 2026 Cyber 150 for Fast Growth and Industry Impact\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN Enters IT-Harvest\u2019s 2026 Cyber 150 for the Second Time in a Row","description":"ANY.RUN has been recognized by IT-Harvest in the 2026 Cyber 150 for the second year in a row, highlighting the company\u2019s growth and industry momentum.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN Enters IT-Harvest\u2019s 2026 Cyber 150 for Fast Growth and Industry Impact\u00a0","datePublished":"2026-03-20T09:57:31+00:00","dateModified":"2026-03-20T09:57:32+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/"},"wordCount":726,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/","url":"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/","name":"ANY.RUN Enters IT-Harvest\u2019s 2026 Cyber 150 for the Second Time in a Row","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2026-03-20T09:57:31+00:00","dateModified":"2026-03-20T09:57:32+00:00","description":"ANY.RUN has been recognized by IT-Harvest in the 2026 Cyber 150 for the second year in a row, highlighting the company\u2019s growth and industry momentum.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-harvest-cyber-150-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN Enters IT-Harvest\u2019s 2026 Cyber 150 for Fast Growth and Industry Impact\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19396"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=19396"}],"version-history":[{"count":18,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19396\/revisions"}],"predecessor-version":[{"id":19420,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19396\/revisions\/19420"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/19407"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=19396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=19396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=19396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}