Entrepreneur’s Guide To Surviving A Tech Bubble

There’s a general sense in Silicon Valley that many unicorn companies will not live up to their billion-dollar status. According to Morrison & Foerster, more than half of the highly valued startups will still be private in 2016, while 7 percent of those will fail. According to bubble spotter Vikram Mansharamani, the Salesforce Tower and other skyscraper construction sites in San Francisco are indicative that we are in a bubble.

What is really happening and should entrepreneurs be worried in this environment? On a recent Ventured podcast, experince venture capitalist and  KPCB general partner Randy Komisar spoke about whether or not there’s a tech bubble and the consequences of raising too much capital. Below is a summary of our conversation.

In A Cycle, Not A Bubble

We’re in a cycle — I don’t believe in the questions about the bubble. I think cycles come and get a little overheated. It’s more like a deflation: How much air comes out of the balloon versus the balloon actually popping?
While the market is never in equilibrium, the public and private markets have different variables driving their valuations. Once companies go public, there is a change in how people value them. Pre-IPO, they are judged by their potential and then post they are judged by their performance. Unfortunately the performance of these companies does not always back up their valuations. Today, public markets are demanding sustainable business models before allowing companies to go public, while in the past companies often went public without the need to prove their model out. What’s happening today will not affect Main Street the way the market correction in 2000 did, but many venture capitalists will fall short of the returns they are accustomed to.

Billion Dollar Startups: The Math And The Madness

Nearly 150 private companies are valued at $1 billion dollars or more. However, only a few of the companies went public at a price greater than $1 billion dollars. At this rate, investors won’t make money. Many investors that put in money in later rounds aren’t the typical Sand Hill Road venture capitalists, but are large hedge funds and private equity investors who have a bigger appetite for risk. With these larger financing rounds, entrepreneurs have more time to run companies with losing financials.

The Problem With Raising Too Much Capital

The unicorn is more like an albatross. Entrepreneurs have to live up to the valuation and ultimately raising too much money can limit their business opportunity. While the entrepreneur may have raised money and minimized dilution, the large valuation makes it even harder to become a public company or become acquired. Acquirers, especially public companies, must behave rationally.

It’s a red flag when entrepreneurs delay launching their product or are not hitting revenue goals, but boast about their hiring growth. It is satisfying when companies reach cash flow neutral. The end game has to be creating real value in the business.

Never Use Debt To Run Operations

When entrepreneurs can’t pay back debt, the debt holders have rights and can control their company. Many entrepreneurs make the mistake of thinking taking on debt is cheaper than equity and that it prevents more dilution. But operations should be run from equity holdings or, better yet, from revenue generated from the business.

Techcrunch

« Phony War: US Military To Carry Out Pretend Cyber War Against China & Russia
ISIS' 'Cyber Caliphate' Hacks 50,000+ Twitter Accounts »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

Jisc

Jisc

Jisc is a membership organisation working in partnership with the UK’s research and education communities to develop the digital technologies they need to teach, discover and thrive.

Central Intelligence Agency (CIA) - USA

Central Intelligence Agency (CIA) - USA

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

Technology Innovation Institute (TII)

Technology Innovation Institute (TII)

TII is a UAE-based research center that aims to lead global advances in AI, robotics, quantum computing, cryptography and secure communications and more.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.

DATS Project

DATS Project

DATS Project enables the utilization of high computing power across a number of cybersecurity services, all on a pay-as-you-go basis, eliminating the need for upfront investment costs.

TeamSystem

TeamSystem

TeamSystem is a leading tech company in the market for digital business management solutions for companies and professionals.