Picnic exits stealth mode with $14 million for social engineering prevention and detection platform
Picnic Emerges from Stealth with $14 Million in Series A to Launch Industry's First Social Engineering Prevention Platform
Picnic, the industry's first social engineering prevention and detection platform, announced today $14 million in Series A funding, led by Crosslink Capital, Rally Ventures, and with continued participation from Energy Impact Partners.
As the root cause of almost every major cyber-attack, social engineering involves attackers harvesting exposed public information to effectively research and attack people, companies, and supply chains. Today's hackers are sidestepping traditional cybersecurity defenses and relying on employees' access to systems to enter and exfiltrate data. "2021 saw some of the largest ransomware attacks on critical infrastructure and the private sector. If as an industry we want to stop ransomware and other major attack vectors before they even start, we need to start thinking differently about how to solve the problem," said Matt Polak, Founder at Picnic. "At Picnic, we recognized early that this is a human problem, not a technical problem. Through the company's platform, organizations can harden the human data layer – thus preventing attackers from gaining employee access." Picnic is a cybersecurity firm specializing in comprehensive social engineering protection for businesses and their people.
Predict: Enables organizations to see what attackers see and predict who may be targeted. The platform emulates attacker reconnaissance at scale with 1000+ data sources across social media, data brokers, breach repositories, the deep and dark web.
Prevent: Neutralizes and eliminates data beyond the firewall that could fuel attacks. Picnic's intelligence enriches existing security investments by making them more predictive while removing exposed information about VIPs, companies, and employees.
Protect: Continuously monitor publicly available data and the latest attack vectors. Through the ability to measure and manage employees' digital footprints, organizations can stay on top of countermeasures against the most recent social engineering attacks.
"Companies continue to make investments in cybersecurity awareness training and phishing simulations to educate employees against clicking on malicious links. Unfortunately, these efforts inevitably fall short. With Picnic, organizations and their people can take control of their privacy in a way that they couldn't before," states Charles Beeler, Managing Director and co-founder of Rally Ventures. "Picnic's dedication to security through privacy, the unparalleled bird's eye view of information and automated actions that the platform provides its users, and the power and protection they give to employees and their families are all things we are proud to be a part of."
"Digital consumers are unaware of how information about them is being saved, aggregated, and circulated today. The boundary between an individual's work and personal life has blurred. This has created a unique and complex cybersecurity challenge for the enterprise: how to protect employees in an environment where their data is being used against them by social engineers," said Jim Routh, former Fortune 100 CISO and current Board Member of Supply Wisdom, GrammaTech, Unbiased Security, and the Global Resiliency Federation. "The primary challenge with this dilemma is that it continues to grow larger due to the success of cybercriminals. Picnic has created an employee-forward cybersecurity platform that empowers businesses and security specialists to know and manage digital footprints beyond the conventional perimeter while offering a benefit to the employee."
To schedule a demo of the platform, please visit https://getpicnic.com/schedule-a-demo/.
About Picnic Picnic Corporation is a cyber security firm, backed by leading institutional investors and a top-flight group of advisors and experts, that predicts and prevents social engineering attacks. Picnic's founders combined their extensive backgrounds in human intelligence, security, and mathematics with a consummate team of engineers to create a leading-edge product set that finally vests people with the power to take control of their data and to stay protected in cyberspace from social engineers.