Reactive vs. Proactive Security Controls: Why CISOs Must Shift Focus

Chief Information Security Officers (CISOs) are like sailing captains navigating their organizations through treacherous waters. The threats are ever-changing, and the stakes are incredibly high. Shifting winds sometimes originate from within the organization’s top leadership, not just from external events,... Read More

Podcast Interview – The Intersection Between Privacy, AI, and Cybersecurity

If you are a GRC professional or a Cybersecurity practitioner, you will find this episode of Picnic’s Podcast Interviews very timely and relevant. Matt Polak, CEO of Picnic, hosts a panel discussion with guests Tom Kemp and David Ross. Tom is the author of... Read More

Podcast Interview – Lt. General (ret.) Charles Moore, fmr. Deputy Commander, US Cyber Command

We are thrilled to share with you a podcast interview with Lt. General (ret.) Charles Moore, also known as “Tuna.” Tuna is a former F-16 Pilot (hence the callsign), Squadron Group Commander, Wing Commander, and former Deputy Commander of the US... Read More

Picnic Corporation Unveils Game-Changing Human Risk API

/ Press Releases / By VanishID WASHINGTON, D.C., U.S., April 22, 2024 — Picnic Corporation, a pioneer in cybersecurity innovation, today announced the launch of its groundbreaking Human Risk API. This technology offers a unique solution for security teams, enabling the seamless integration... Read More

Picnic Demo at UniCon24

Ben Andreas, VP of Managed Services at Picnic, offers a demo of the digital risk protection services (DRPS) platform to the attendees of UniCon24, a virtual day-long event hosted by Scythe and sponsored by Picnic. Read More

The Mother of All Breaches: What You Need to Know and How to Stay Safe

In an era where digital footprints are left everywhere, the recent unveiling of “The Mother of All Breaches” has sent shockwaves through the cybersecurity community. This extensive data breach, affecting platforms like LinkedIn, X (Twitter), and Dropbox, has compromised an unprecedented 26 billion records. Such a... Read More

Uniting Pre and Post-Access Threat Defense

In this session, recorded on 02/05/2024, Picnic and Scythe joined forces to offer a perspective on prevention that spans the entire kill chain. Learn how attackers conduct target reconnaissance pre-access by leveraging OSINT and exploiting human vulnerabilities. Discover how emulating... Read More

Enhancing Security Against Social Engineering: Safeguarding Customer Interaction Centers and IT Support Teams

Customer service centers, commonly known as call centers and IT support teams, often referred to as help desks, are becoming an increasingly popular target for threat actors to infiltrate organizations through social engineering. These employee groups typically possess elevated privileges... Read More

Introduction to Picnic

If you want to learn about Picnic and how we protect the human attack surface with digital risk protection services, this is the webinar to watch. Matt Polak, CEO and founder of Picnic, explains the rationale behind Picnic’s approach to... Read More

Impersonation on LinkedIn: Recognizing the Top 10 Telltale Signs of Threat Actors

LinkedIn has become an essential tool for professionals to network, share knowledge, and seek career opportunities. Yet, like any popular platform, it has become a fertile ground for threat actors to exploit unsuspecting users. In fact, our research indicates it’s... Read More

Okta October 2023 Breach

Download PDF Incident Name: Okta October 2023 Breach Date of Incident: 2nd – 18th October 2023 Summary: Okta, a well-known identity and authentication provider based in the US, suffered a data breach in October 2023. On October 20, 2023, Okta released details... Read More

23andMe October 2023 Credential Stuffing Attack

Download PDF Incident Name: 23andMe October 2023 Credential Stuffing Attack Date of Incident: October 2nd, 2023 Summary: 23andMe is a biotechnology company based in California. They provide genetic testing to customers, offering details on their ancestors and genetic health data. On October... Read More

Protecting Against Social Engineering and Credential Stuffing

NIST CSF, MITRE ATT&CK, and HASP frameworks In today’s digital world, the ever-evolving landscape of cybersecurity threats poses significant challenges for organizations. Two major concerns are social engineering and credential stuffing, the attack vectors responsible for most breaches. Organizations rely... Read More

MGM Resorts International September 2023 Ransomware Attack

Download PDF Incident Name: MGM Resorts International September 2023 Ransomware Attack Date of Incident: September 10th, 2023 Summary: On September 11th, 2023, MGM Resorts International announced that they are currently dealing with a cyber attack that is impacting their company’s systems and... Read More

How Threat Actors Exploit Generative AI For Social Engineering and Credential Compromise

Social engineering attacks are one of the most commonly used methods for cyber criminals to gain access to sensitive data and information. Recent advances in generative AI have enabled threat actors to utilize AI-generated content to fuel these attacks, making... Read More

Henry Ford Health Data Breach

Download PDF Incident Name: Henry Ford Health Data Breach Date of Public Report: July 18th, 2023 Date of Incident: March 3rd, 2023 Summary: Henry Ford Health is a Detroit based not-for-profit healthcare provider. On July 18, 2023, the company informed customers that it... Read More

Audience 1st Podcast: CISO Approaches to Human Attack Surface Protection Amidst Budget Cuts

44 Minutes of Cybersecurity Insights Picnic CEO Matt Polak joined Jeff Farinich, CISO of New American Funding, on an Audience 1st podcast hosted by Dani Woolf. With the accelerating proliferation of cyber threats, a challenge at hand involves addressing the human attack surface –... Read More

How to Proactively Protect Your Organization’s High-Value Targets

Cybercriminals are always looking for ways to exploit the exposed personal data of high-value targets to breach companies. High-value targets (HVTs) are those individuals within an organization who have access to sensitive information or assets and have the potential to... Read More

The human element and continuous threat exposure management: How to protect the human attack surface

The importance of understanding and managing the human element in your organization’s security strategy cannot be overstated as the stakes rise in the cybersecurity landscape. This whitepaper explores and exposes the intersection of threat intelligence, attack surface management, and human vulnerabilities... Read More

Human Element Remains Key Factor in Cybersecurity: The 2023 Verizon DBIR Report and VanishID’s Global Threat Intelligence Findings

The spotlight in the fight against cybercrime continues to be an often overlooked yet pivotal factor – the human element. A profound understanding of this dimension is vital for safeguarding digital ecosystems, and the recently published 2023 Verizon Data Breach... Read More

VanishID joins the Tidal Product Registry™

We all know that the cybersecurity vendor landscape is extensive and looks complex. Although there is a gap in cybersecurity talent worldwide, there’s certainly no lack of products in the marketplace that provide defenders with threat visibility and security controls.... Read More

Tidal Cyber Fireside Chat with Picnic CEO Matt Polak

We Got This Covered: Picnic Picnic CEO Matt Polak recently joined Tidal Cyber’s Chief Innovation Officer Frank Duff on the “We’ve Got This Covered” fireside chat series to discuss Picnic joining the Tidal Product Registry™, Picnic’s scope within the MITRE ATT&CK® framework,... Read More

Picnic Corporation Launches Practical Framework to Combat Human-Centric Attacks

Company arms the cybersecurity community with best practices aligned to NIST CSF and MITRE ATT&CK to proactively protect the human attack surface WASHINGTON, D.C., U.S., June 15, 2023 /EINPresswire.com/ — Most organizational breaches today continue to be the result of... Read More

Keeping criminals from exploiting personally identifiable information

As specialists in human attack surface protection, we at VanishID know all too well the importance of preventing the exploitation of exposed personally identifiable information (PII) by cyber criminals. While we handle this problem for enterprises, individuals need resources to... Read More

Copyright © 2019 – 2025 Picnic Corporation (dba VanishID)