Family Business Magazine x VanishID Webinar: Digital Exposure, The Hidden Security Threat to Family Businesses

VanishID CEO Matt Polak joined Family Business Magazine in November 2025 to talk about how the line between work and home doesn’t exist anymore. Especially not for threat actors. Digital breadcrumbs lead to very real threats. As Matt explained: “They’re... Read More

Stanford’s Former CIO Raman Khanna on Why Endpoint Security Isn’t Enough

Raman Khanna, former CIO of Stanford University and board member at VanishID, gets straight to the point about a gap most security teams haven’t fully addressed. “We are tackling end point security, network security and all those things, but human... Read More

Army Veteran Turned Cyber Investor Matt Bigge on the Evolving Threat Landscape

What should companies do about the gap between technical defenses and the human attack surface? Matt Bigge, Partner at Crosslink Capital and U.S. Army Veteran, shared with us recently that his concern isn’t about firewalls or endpoint detection. The reality... Read More

“It Happened to Me” — Former Google CIO Ben Fried on Executive Targeting

“This is a team of sophisticated technologists applying new technology to solve problems very much like the problems that faced me.” Ben Fried, former Google exec and VanishID board member, shares a story that may not be all that uncommon... Read More

30-Year VC Veteran Jeff Hinck on Why Digital Executive Protection Matters

“I think more and more recently there’s been more companies trying to address a broader market in the digital protection space. We think VanishID is really at the forefront of that. — Jeff Hinck, Managing Director, Rally Ventures The threat... Read More

Unicon 2025 Fall Edition: Virtual Fireside Chat: Stories from the Front Lines

VanishID CEO Matt Polak and Bugcrowd Founder Casey Ellis discuss real-world horror stories from cyber and physical security, and how human risk intelligence and attack surface management help organizations stay protected. As pioneers in digital footprint protection and executive security,... Read More

VanishID Selected for Mastercard’s Award-Winning Start Path Program

Enterprise digital executive protection pioneer among five innovative startups chosen as part of a new Security Solutions-focused program to support accelerated cybersecurity and fraud prevention innovation Bethesda, MD- July 1st, 2025 – VanishID, the first agentic AI-powered digital executive protection service... Read More

SecurityWeek: Picnic Corporation Rebrands to VanishID, Raises $10 Million

Written by Eduard Kovacs, managing editor at SecurityWeek. Picnic Corporation announced on Tuesday that it has rebranded to VanishID and it has raised $10 million in funding. VanishID has developed a solution designed to provide online protection to executives and employees. Similar... Read More

CyberBytes Podcast with Matt Polak

In this episode of CyberBytes: The Podcast, Joseph Cooper was joined by Matt Polak, Founder and CEO of VanishID. VanishID is revolutionizing how organizations defend against social engineering by proactively identifying and removing the publicly available personal information that threat... Read More

VanishID Secures $10M in Funding as it Launches Digital CEO Protection Offering

Armed with investment from Dell Technologies Capital, agentic AI-powered digital executive protection leader prepares for its next stage of growth Washington, DC – April 22, 2025 – VanishID, the leader in agentic AI-powered digital executive protection for enterprises, today announced its rebrand... Read More

VanishID’s Executive Digital Privacy Snapshot Reveals Alarming Risks for C-Suite Executives Across All Industries

Data brokers make more than 93% of U.S. Chief Executives’ home addresses visible Washington, DC – March 5, 2025 – Digital executive protection leader VanishID (formerly Picnic) today released a summary report, “Digital Privacy Snapshot: Leadership at Risk,” revealing that U.S. chief... Read More

Matt Polak Interview on Hackernoon

/ In the News / By VanishID In this short interview by NewsByte.Tech published on HackerNoon, Matt answers the following questions: What is your company in 2–5 words? Why is now the time for your company to exist? What do you love about... Read More

Reactive vs. Proactive Security Controls: Why CISOs Must Shift Focus

Chief Information Security Officers (CISOs) are like sailing captains navigating their organizations through treacherous waters. The threats are ever-changing, and the stakes are incredibly high. Shifting winds sometimes originate from within the organization’s top leadership, not just from external events,... Read More

Picnic Corporation Unveils Game-Changing Human Risk API

/ Press Releases / By VanishID WASHINGTON, D.C., U.S., April 22, 2024 — Picnic Corporation, a pioneer in cybersecurity innovation, today announced the launch of its groundbreaking Human Risk API. This technology offers a unique solution for security teams, enabling the seamless integration... Read More

The Mother of All Breaches: What You Need to Know and How to Stay Safe

In an era where digital footprints are left everywhere, the recent unveiling of “The Mother of All Breaches” has sent shockwaves through the cybersecurity community. This extensive data breach, affecting platforms like LinkedIn, X (Twitter), and Dropbox, has compromised an unprecedented 26 billion records. Such a... Read More

Enhancing Security Against Social Engineering: Safeguarding Customer Interaction Centers and IT Support Teams

Customer service centers, commonly known as call centers and IT support teams, often referred to as help desks, are becoming an increasingly popular target for threat actors to infiltrate organizations through social engineering. These employee groups typically possess elevated privileges... Read More

Impersonation on LinkedIn: Recognizing the Top 10 Telltale Signs of Threat Actors

LinkedIn has become an essential tool for professionals to network, share knowledge, and seek career opportunities. Yet, like any popular platform, it has become a fertile ground for threat actors to exploit unsuspecting users. In fact, our research indicates it’s... Read More

Protecting Against Social Engineering and Credential Stuffing

NIST CSF, MITRE ATT&CK, and HASP frameworks In today’s digital world, the ever-evolving landscape of cybersecurity threats poses significant challenges for organizations. Two major concerns are social engineering and credential stuffing, the attack vectors responsible for most breaches. Organizations rely... Read More

How Threat Actors Exploit Generative AI For Social Engineering and Credential Compromise

Social engineering attacks are one of the most commonly used methods for cyber criminals to gain access to sensitive data and information. Recent advances in generative AI have enabled threat actors to utilize AI-generated content to fuel these attacks, making... Read More

Henry Ford Health Data Breach

Download PDF Incident Name: Henry Ford Health Data Breach Date of Public Report: July 18th, 2023 Date of Incident: March 3rd, 2023 Summary: Henry Ford Health is a Detroit based not-for-profit healthcare provider. On July 18, 2023, the company informed customers that it... Read More

How to Proactively Protect Your Organization’s High-Value Targets

Cybercriminals are always looking for ways to exploit the exposed personal data of high-value targets to breach companies. High-value targets (HVTs) are those individuals within an organization who have access to sensitive information or assets and have the potential to... Read More

Human Element Remains Key Factor in Cybersecurity: The 2023 Verizon DBIR Report and VanishID’s Global Threat Intelligence Findings

The spotlight in the fight against cybercrime continues to be an often overlooked yet pivotal factor – the human element. A profound understanding of this dimension is vital for safeguarding digital ecosystems, and the recently published 2023 Verizon Data Breach... Read More

VanishID joins the Tidal Product Registry™

We all know that the cybersecurity vendor landscape is extensive and looks complex. Although there is a gap in cybersecurity talent worldwide, there’s certainly no lack of products in the marketplace that provide defenders with threat visibility and security controls.... Read More

Keeping criminals from exploiting personally identifiable information

As specialists in human attack surface protection, we at VanishID know all too well the importance of preventing the exploitation of exposed personally identifiable information (PII) by cyber criminals. While we handle this problem for enterprises, individuals need resources to... Read More

Copyright © 2019 – 2026 Picnic Corporation (dba VanishID)