Impersonation on LinkedIn: Recognizing the Top 10 Telltale Signs of Threat Actors

LinkedIn has become an essential tool for professionals to network, share knowledge, and seek career opportunities. Yet, like any popular platform, it has become a fertile ground for threat actors to exploit unsuspecting users. In fact, our research indicates it’s... Read More

UCLA Anderson School of Management

Howard Miller is the CIO at UCLA Anderson School of Management. He has been a VanishID customer since 2023 and, in this video, shares the challenges VanishID helps to solve and the value that the service brings to his organization’s... Read More

Rosen’s Diversified (RDI)

Brent Baker is the Executive Vice President of Information Technology at Rosen’s Diversified (RDI), a conglomerate of businesses in the Agriculture, Manufacturing, and Life Sciences industries. He spent time with us to share the value and security outcomes of partnering... Read More

Protecting Against Social Engineering and Credential Stuffing

NIST CSF, MITRE ATT&CK, and HASP frameworks In today’s digital world, the ever-evolving landscape of cybersecurity threats poses significant challenges for organizations. Two major concerns are social engineering and credential stuffing, the attack vectors responsible for most breaches. Organizations rely... Read More

Focus on security education, not cyber awareness training

Written by Karen Walsh Phishing scams and other social engineering attacks work because cybercriminals use people’s digital footprints against them. Threat actors scrape social media and the internet, looking for insights about people. Cybersecurity awareness training programs, however, rarely teach people... Read More

CEO fraud: Protecting executives protects everyone

Cybercriminals do what they do for money. According to the 2022 Data Breach Investigations Report, 96% of data breaches were caused by external actors motivated by financial or personal gain. In order to maximize their return on investment, these cybercriminals take... Read More

Security Guy TV features Picnic

Security Guy TV on how Picnic helps organizations see and remediate human risk beyond the corporate firewall Picnic CEO Matt Polak joined security expert Chuck Harold of Security Guy TV yesterday to talk about the problem of social engineering and how Picnic works to remediate... Read More

Copyright © 2019 – 2026 Picnic Corporation (dba VanishID)