UCLA Anderson School of Management
Howard Miller is the CIO at UCLA Anderson School of Management. He has been a Picnic customer for a few months and, in this video, shares the challenges Picnic helps
UCLA Anderson School of Management Read More
Howard Miller is the CIO at UCLA Anderson School of Management. He has been a Picnic customer for a few months and, in this video, shares the challenges Picnic helps
UCLA Anderson School of Management Read More
Download PDF Incident Name: Okta October 2023 Breach Date of Incident: 2nd – 18th October 2023 Summary: Okta, a well-known identity and authentication provider based in the US, suffered a
Okta October 2023 Breach Read More
Download PDF Incident Name: 23andMe October 2023 Credential Stuffing Attack Date of Incident: October 2nd, 2023 Summary: 23andMe is a biotechnology company based in California. They provide genetic testing to
23andMe October 2023 Credential Stuffing Attack Read More
Brent Baker is the Executive Vice President of Information Technology at Rosen’s Diversified (RDI), a conglomerate of businesses in the Agriculture, Manufacturing, and Life Sciences industries. He spent time with
Rosen’s Diversified (RDI) Read More
NIST CSF, MITRE ATT&CK, and HASP frameworks In today’s digital world, the ever-evolving landscape of cybersecurity threats poses significant challenges for organizations. Two major concerns are social engineering and credential
Protecting Against Social Engineering and Credential Stuffing Read More
Download PDF Incident Name: Retool August 2023 Social Engineering Attack Date of Incident: August 27th, 2023 Summary: Retool, a popular software company, announced on September 13, 2023, that it had
Retool August 2023 Social Engineering Attack Read More
Download PDF Incident Name: MGM Resorts International September 2023 Ransomware Attack Date of Incident: September 10th, 2023 Summary: On September 11th, 2023, MGM Resorts International announced that they are currently
MGM Resorts International September 2023 Ransomware Attack Read More
Download PDF Incident Name: Kroll August 2023 SIM Swap Attack Date of Incident: August 19th, 2023 Summary: Kroll is a global company providing organizations with risk and financial solutions. On
Kroll August 2023 SIM Swap Attack Read More
Download PDF Incident Name: Okta August 2023 Social Engineering Attack Advisory Date of Incident: August 2023 Summary: Okta, a provider of identity and authentication services, recently issued a warning to
Okta August 2023 Social Engineering Attack Advisory Read More
Download PDF Incident Name: CoinsPaid Social Engineering Attack Date of Report: August 7th, 2023 Date of Incident: July 22nd, 2023 Summary: CoinsPaid, one of the world’s largest cryptocurrency payment providers, suffered
CoinsPaid July 2023 Social Engineering Attack Read More
Download PDF Incident Name: Henry Ford Health Data Breach Date of Public Report: July 18th, 2023 Date of Incident: March 3rd, 2023 Summary: Henry Ford Health is a Detroit based
Henry Ford Health Data Breach Read More
44 Minutes of Cybersecurity Insights Picnic CEO Matt Polak joined Jeff Farinich, CISO of New American Funding, on an Audience 1st podcast hosted by Dani Woolf. With the accelerating proliferation
The importance of understanding and managing the human element in your organization’s security strategy cannot be overstated as the stakes rise in the cybersecurity landscape. This whitepaper explores and exposes
We Got This Covered: Picnic Picnic CEO Matt Polak recently joined Tidal Cyber’s Chief Innovation Officer Frank Duff on the “We’ve Got This Covered” fireside chat series to discuss Picnic
Tidal Cyber Fireside Chat with Picnic CEO Matt Polak Read More
Human vulnerabilities create risks to infrastructure and data, which impacts operational, legal, financial, and reputational risks. Picnic prioritizes the vulnerabilities by mapping them to external threat intelligence and target intelligence.
How Picnic Protects the Human Attack Surface Read More
Company arms the cybersecurity community with best practices aligned to NIST CSF and MITRE ATT&CK to proactively protect the human attack surface WASHINGTON, D.C., U.S., June 15, 2023 /EINPresswire.com/ —
Picnic Corporation Launches Practical Framework to Combat Human-Centric Attacks Read More
The Threat of the Human Attack Surface Picnic CEO Matt Polak shares practical steps that businesses can take to protect themselves from ransomware, including simulating social engineering attacks, safeguarding the
The Threat Show! Ep. 29 with guest Matt Polak Read More
VanishID is the first platform I’ve seen that can map threat intelligence to an organization’s employeepopulation and proactively mitigate the risk of humancentric attacks.” — Chris Key, former Chief Product
Social engineers collect intelligence on human targets to develop paths for attack and compromise. Picnic’s platform emulates this external, human attack surface reconnaissance to expose Target Intelligence about an organization.
Picnic Target Intelligence Report: Mailchimp Read More
Download PDF Incident Name: Kodi February 2023 Data Breach Date of Public Report: April 8th, 2023 Date of Incident: February 16th and 21st, 2023 Summary: Kodi is an open-source media
Kodi February 2023 Data Breach Read More
Social engineers collect intelligence on human targets to develop paths for attack and compromise. Picnic’s platform emulates this external, human attack surface reconnaissance to expose Target Intelligence about an organization.
Picnic Target Intelligence Report: Uber Read More
Threat actors leverage exposed credentials, including passwords associated with employee and contractor personal accounts, in order to power credential stuffing attacks and gain initial access to targeted infrastructure. Picnic provides
How Picnic Protects Against Credential Stuffing Attacks Read More
Download PDF Incident Name: Activision December 2022 Social Engineering Attack and Data Breach Date of Public Report: February 27th, 2023 Date of Incident: December 4th, 2022 Summary: Activision is a
Activision Dec 2022 Social Engineering Attack and Data Breach Read More
Webinar with Scott Goodhart, CISO Emeritus We talk with Scott Goodhart, CISO Emeritus, on the importance of knowing your human attack surface and how to manage exposed employee data to mitigate