Entrepreneur’s Guide To Surviving A Tech Bubble

There’s a general sense in Silicon Valley that many unicorn companies will not live up to their billion-dollar status. According to Morrison & Foerster, more than half of the highly valued startups will still be private in 2016, while 7 percent of those will fail. According to bubble spotter Vikram Mansharamani, the Salesforce Tower and other skyscraper construction sites in San Francisco are indicative that we are in a bubble.

What is really happening and should entrepreneurs be worried in this environment? On a recent Ventured podcast, experince venture capitalist and  KPCB general partner Randy Komisar spoke about whether or not there’s a tech bubble and the consequences of raising too much capital. Below is a summary of our conversation.

In A Cycle, Not A Bubble

We’re in a cycle — I don’t believe in the questions about the bubble. I think cycles come and get a little overheated. It’s more like a deflation: How much air comes out of the balloon versus the balloon actually popping?
While the market is never in equilibrium, the public and private markets have different variables driving their valuations. Once companies go public, there is a change in how people value them. Pre-IPO, they are judged by their potential and then post they are judged by their performance. Unfortunately the performance of these companies does not always back up their valuations. Today, public markets are demanding sustainable business models before allowing companies to go public, while in the past companies often went public without the need to prove their model out. What’s happening today will not affect Main Street the way the market correction in 2000 did, but many venture capitalists will fall short of the returns they are accustomed to.

Billion Dollar Startups: The Math And The Madness

Nearly 150 private companies are valued at $1 billion dollars or more. However, only a few of the companies went public at a price greater than $1 billion dollars. At this rate, investors won’t make money. Many investors that put in money in later rounds aren’t the typical Sand Hill Road venture capitalists, but are large hedge funds and private equity investors who have a bigger appetite for risk. With these larger financing rounds, entrepreneurs have more time to run companies with losing financials.

The Problem With Raising Too Much Capital

The unicorn is more like an albatross. Entrepreneurs have to live up to the valuation and ultimately raising too much money can limit their business opportunity. While the entrepreneur may have raised money and minimized dilution, the large valuation makes it even harder to become a public company or become acquired. Acquirers, especially public companies, must behave rationally.

It’s a red flag when entrepreneurs delay launching their product or are not hitting revenue goals, but boast about their hiring growth. It is satisfying when companies reach cash flow neutral. The end game has to be creating real value in the business.

Never Use Debt To Run Operations

When entrepreneurs can’t pay back debt, the debt holders have rights and can control their company. Many entrepreneurs make the mistake of thinking taking on debt is cheaper than equity and that it prevents more dilution. But operations should be run from equity holdings or, better yet, from revenue generated from the business.

Techcrunch

« Phony War: US Military To Carry Out Pretend Cyber War Against China & Russia
ISIS' 'Cyber Caliphate' Hacks 50,000+ Twitter Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

British Insurance Brokers’ Association (BIBA)

British Insurance Brokers’ Association (BIBA)

BIBA is the UK’s leading general insurance intermediary organisation. Use the ‘Find Insurance‘ section of the BIBA website to find providers of cyber risk insurance in the UK.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

Start Left® Security

Start Left® Security

Great security culture doesn't just happen; you ENGINEER it.

iVision

iVision

iVision is a technology integration and management firm that engineers success for clients through objective recommendations, process and technology expertise and best-of-breed guidance.

GetHacked.ca

GetHacked.ca

GetHackded.ca is a certified company offering penetration testing and specialized cybersecurity services.

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

Orca Tech

Orca Tech

Orca Tech brings together a portfolio of complimentary vendor in the IT security industry to help provide a complete solution to meet the requirements of our Partners across all sectors.