Entrepreneur’s Guide To Surviving A Tech Bubble

There’s a general sense in Silicon Valley that many unicorn companies will not live up to their billion-dollar status. According to Morrison & Foerster, more than half of the highly valued startups will still be private in 2016, while 7 percent of those will fail. According to bubble spotter Vikram Mansharamani, the Salesforce Tower and other skyscraper construction sites in San Francisco are indicative that we are in a bubble.

What is really happening and should entrepreneurs be worried in this environment? On a recent Ventured podcast, experince venture capitalist and  KPCB general partner Randy Komisar spoke about whether or not there’s a tech bubble and the consequences of raising too much capital. Below is a summary of our conversation.

In A Cycle, Not A Bubble

We’re in a cycle — I don’t believe in the questions about the bubble. I think cycles come and get a little overheated. It’s more like a deflation: How much air comes out of the balloon versus the balloon actually popping?
While the market is never in equilibrium, the public and private markets have different variables driving their valuations. Once companies go public, there is a change in how people value them. Pre-IPO, they are judged by their potential and then post they are judged by their performance. Unfortunately the performance of these companies does not always back up their valuations. Today, public markets are demanding sustainable business models before allowing companies to go public, while in the past companies often went public without the need to prove their model out. What’s happening today will not affect Main Street the way the market correction in 2000 did, but many venture capitalists will fall short of the returns they are accustomed to.

Billion Dollar Startups: The Math And The Madness

Nearly 150 private companies are valued at $1 billion dollars or more. However, only a few of the companies went public at a price greater than $1 billion dollars. At this rate, investors won’t make money. Many investors that put in money in later rounds aren’t the typical Sand Hill Road venture capitalists, but are large hedge funds and private equity investors who have a bigger appetite for risk. With these larger financing rounds, entrepreneurs have more time to run companies with losing financials.

The Problem With Raising Too Much Capital

The unicorn is more like an albatross. Entrepreneurs have to live up to the valuation and ultimately raising too much money can limit their business opportunity. While the entrepreneur may have raised money and minimized dilution, the large valuation makes it even harder to become a public company or become acquired. Acquirers, especially public companies, must behave rationally.

It’s a red flag when entrepreneurs delay launching their product or are not hitting revenue goals, but boast about their hiring growth. It is satisfying when companies reach cash flow neutral. The end game has to be creating real value in the business.

Never Use Debt To Run Operations

When entrepreneurs can’t pay back debt, the debt holders have rights and can control their company. Many entrepreneurs make the mistake of thinking taking on debt is cheaper than equity and that it prevents more dilution. But operations should be run from equity holdings or, better yet, from revenue generated from the business.

Techcrunch

« Phony War: US Military To Carry Out Pretend Cyber War Against China & Russia
ISIS' 'Cyber Caliphate' Hacks 50,000+ Twitter Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

IABG

IABG

Activities include consulting services in the development of software systems in the area of secure information and data communication.

Onspring

Onspring

Onspring is the cloud-based platform of choice for governance, risk and compliance (GRC) teams and business operations experts across multiple industries.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

Real Protect

Real Protect

Real Protect is a Brazilian provider of managed security (MSS) and cyber defense services.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

Cyber Security Partners (CSP)

Cyber Security Partners (CSP)

Cyber Security Partners specialise in the provision of Cyber Security Consultancy, Data Protection and Certification and Compliance services.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

IDVerse

IDVerse

IDVerse is focused on making user verification effortless through technology. We build intelligent tools that protect users from identity fraud while enabling a seamless user experience.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.