The Ultimate Guide to Deleting Yourself From the Internet (And Reclaiming Your Privacy)

As we spend more and more time on the internet, we easily lose control of our digital identity, which is not just inconvenient but actually dangerous. With every online form you fill out, social media post you share, or website... Read More

What Is a Digital Footprint? How to Check, Track, and Clean Yours

A digital footprint is a unique trail of data tracing everything you do online, including posting on social media, shopping on e-commerce sites, or simply browsing the web. Importantly, it can shape how others perceive you, influence job opportunities, and... Read More

How to Protect and Reduce Your Digital Footprint: Practical Safety Tips

Every click, search, and scroll you make online contributes to your digital footprint, which is a trail of data that reveals who you are, what you do, and where you’ve been on the internet. There are two types: active digital... Read More

How to Prevent Social Engineering and Phishing Attacks: Essential Strategies to Stay Safe Online

Social engineering is the art of manipulating people into giving up confidential information, often by posing as a trusted source. Phishing is a common form of social engineering that involves deceptive emails, messages, or websites designed to trick you into... Read More

How to Delete Your Digital Footprint: 7 Powerful Ways to Remove Personal Data Online

Your digital footprint is the trail of data you leave behind (digital exhaust) every time you browse, shop, post, or sign up online. As we spend a lot of time on the internet, our digital footprint is bigger and more... Read More

VanishID Joins Mastercard’s award-winning Start Path program focused on Security Solutions

Enterprise digital executive protection leader is one of five global innovators selected to participate in a program geared towards accelerating cybersecurity solutions We’re thrilled to announce that VanishID has been selected to participate in Mastercard’s new Start Path Security Solutions program,... Read More

Raise the Bar as Attackers Lower the Barrier to Entry

By Frank Duff, Tidal Cyber and Matt Polak, Vanish ID Last year we started writing about how threat actors are using AI to lower the barriers to entry. Since then, we’ve seen an uptick in this trend, especially when it comes to writing much more... Read More

CEO Protection: Securing the Most Targeted People in Your Organization

Let’s talk about a reality that keeps security teams up at night: your CEO is likely the most exposed person in your organization. The Visibility Paradox Today’s business leaders face what we call the “visibility paradox” – they need to... Read More

DTC’s VanishID Investment: Personal Exposure is Corporate Risk

Written by Raman Khanna, Managing Director, Dell Technologies Capital Imagine this: A trusted finance exec at a mid-size public company receives a seemingly normal email from their CEO. It’s referencing a real offsite from last week and includes a PDF attachment with... Read More

Picnic is now VanishID

We are thrilled to announce that Picnic Corporation is now doing business as VanishID. Why the Change? As our company has evolved, our work increasingly involves non-security employees and executives who may not be familiar with the history behind the Picnic... Read More

VanishID Executive Digital Privacy Snapshot: Leadership at Risk

Introduction The overwhelming prevalence of data breaches, exposed credentials, and the visibility of personal information underscores an urgent need for enhanced digital security measures tailored for executive protection.  The security of executive leadership has become a paramount concern for organizations... Read More

Safe at Work, Safe at Home: The Case for Extending Digital Protection to Families

Scammers are getting smarter, and their tactics more sophisticated. They don’t just go after businesses or high-profile individuals anymore—they target everyday people, often during their most vulnerable moments. We recently witnessed a heartbreaking scam of the type that triggered Jason... Read More

AI scambaiters against scammers are a painkiller but are not the antidote

There is campaign that is catching a lot of eyeballs right now as a write this blog. It’s a neat use of technology and marketing masterstroke. If you missed it, “Daisy” is an AI-grandma scambaiter created by O2 (Telefónica UK) to fight... Read More

The first page of Google search results about you is a lot scarier than the dark web

The first page of Google search results about you is a lot scarier than the dark web. But news organizations and some security vendors love to scare people about the dark web, so I thought I’d offer some thoughts on that... Read More

Reactive vs. Proactive Security Controls: Why CISOs Must Shift Focus

Chief Information Security Officers (CISOs) are like sailing captains navigating their organizations through treacherous waters. The threats are ever-changing, and the stakes are incredibly high. Shifting winds sometimes originate from within the organization’s top leadership, not just from external events,... Read More

Picnic Demo at UniCon24

Ben Andreas, VP of Managed Services at Picnic, offers a demo of the digital risk protection services (DRPS) platform to the attendees of UniCon24, a virtual day-long event hosted by Scythe and sponsored by Picnic. Read More

The Mother of All Breaches: What You Need to Know and How to Stay Safe

In an era where digital footprints are left everywhere, the recent unveiling of “The Mother of All Breaches” has sent shockwaves through the cybersecurity community. This extensive data breach, affecting platforms like LinkedIn, X (Twitter), and Dropbox, has compromised an unprecedented 26 billion records. Such a... Read More

Uniting Pre and Post-Access Threat Defense

In this session, recorded on 02/05/2024, Picnic and Scythe joined forces to offer a perspective on prevention that spans the entire kill chain. Learn how attackers conduct target reconnaissance pre-access by leveraging OSINT and exploiting human vulnerabilities. Discover how emulating... Read More

Enhancing Security Against Social Engineering: Safeguarding Customer Interaction Centers and IT Support Teams

Customer service centers, commonly known as call centers and IT support teams, often referred to as help desks, are becoming an increasingly popular target for threat actors to infiltrate organizations through social engineering. These employee groups typically possess elevated privileges... Read More

Introduction to Picnic

If you want to learn about Picnic and how we protect the human attack surface with digital risk protection services, this is the webinar to watch. Matt Polak, CEO and founder of Picnic, explains the rationale behind Picnic’s approach to... Read More

OGE Energy Corp

Jason Nations is the Director of Enterprise Security at OG&E. A seasoned IT and OT security executive, Jason highlights in this video interview the high value and easy uptake and execution of including VanishID (formerly dba Picnic) in his data... Read More

Impersonation on LinkedIn: Recognizing the Top 10 Telltale Signs of Threat Actors

LinkedIn has become an essential tool for professionals to network, share knowledge, and seek career opportunities. Yet, like any popular platform, it has become a fertile ground for threat actors to exploit unsuspecting users. In fact, our research indicates it’s... Read More

UCLA Anderson School of Management

Howard Miller is the CIO at UCLA Anderson School of Management. He has been a VanishID customer since 2023 and, in this video, shares the challenges VanishID helps to solve and the value that the service brings to his organization’s... Read More

Rosen’s Diversified (RDI)

Brent Baker is the Executive Vice President of Information Technology at Rosen’s Diversified (RDI), a conglomerate of businesses in the Agriculture, Manufacturing, and Life Sciences industries. He spent time with us to share the value and security outcomes of partnering... Read More

Copyright © 2019 – 2025 Picnic Corporation (dba VanishID)