Protecting Against Social Engineering and Credential Stuffing

NIST CSF, MITRE ATT&CK, and HASP frameworks In today’s digital world, the ever-evolving landscape of cybersecurity threats poses significant challenges for organizations. Two major concerns are social engineering and credential stuffing, the attack vectors responsible for most breaches. Organizations rely... Read More

Focus on security education, not cyber awareness training

Written by Karen Walsh Phishing scams and other social engineering attacks work because cybercriminals use people’s digital footprints against them. Threat actors scrape social media and the internet, looking for insights about people. Cybersecurity awareness training programs, however, rarely teach people... Read More

CEO fraud: Protecting executives protects everyone

Cybercriminals do what they do for money. According to the 2022 Data Breach Investigations Report, 96% of data breaches were caused by external actors motivated by financial or personal gain. In order to maximize their return on investment, these cybercriminals take... Read More

Security Guy TV features Picnic

Security Guy TV on how Picnic helps organizations see and remediate human risk beyond the corporate firewall Picnic CEO Matt Polak joined security expert Chuck Harold of Security Guy TV yesterday to talk about the problem of social engineering and how Picnic works to remediate... Read More

Copyright © 2019 – 2025 Picnic Corporation (dba VanishID)