Skip to content
Use promo code: EOnehMR2 at checkout for 20% Off 💐 with Optery’s Spring into Spring Sale! 🪺
Curves Curves
Shield

Organizations must shift to proactive cybersecurity, according to the 2025 Armis Cyberwarfare Report

The 2025 Armis Cyberwarfare Report highlights the ramifications of AI and the need for organizations to move beyond reactive measures if they want to protect their operations and the people they serve.  This latest study, conducted by Censuswide, surveyed over 1,800+ IT decision-makers in companies with 1,000+ employees in the U.S., UK, Italy, France, Australia,Continue reading "Organizations must shift to proactive cybersecurity, according to the 2025 Armis Cyberwarfare Report"
Shield

Optery Named Winner in Three Categories by the 2025 Cybersecurity Excellence Awards

Optery is excited to announce its recognition for the second consecutive year as a winner in three categories by the 2025 Cybersecurity Excellence Awards. These awards celebrate excellence, innovation, and leadership in the cybersecurity industry. Optery’s recognition in these categories highlights its ongoing commitment to mitigating risks associated with exposed executive and employee PII—commonly exploitedContinue reading "Optery Named Winner in Three Categories by the 2025 Cybersecurity Excellence Awards"
Shield

Personal Data Removal: A Core Cybersecurity Measure

Why data broker removal is a must-have for organizations Personal data exposure is the biggest cyber threat to organizations today. It enables the most successful attack vectors: social engineering and the use of compromised credentials. Despite this reality, many companies continue to overlook a major security risk—vast amounts of employee and executive personal data readilyContinue reading "Personal Data Removal: A Core Cybersecurity Measure"
Shield

CrowdStrike’s 2025 Global Threat Report Reveals Phone-Based Social Engineering Is Surging

CrowdStrike’s 2025 Global Threat Report reveals adversaries are increasingly using identity compromise and social engineering to gain initial access and perform lateral movement.  In 2024, CrowdStrike Intelligence tracked a sharp rise in distinct campaigns leveraging telephone-based social engineering for initial access, including vishing and help desk impersonation tactics. Multiple adversaries incorporated vishing into their intrusionsContinue reading "CrowdStrike’s 2025 Global Threat Report Reveals Phone-Based Social Engineering Is Surging"
Shield

Leaked Chat Logs Reveal Black Basta’s Use of Data Brokers for Targeting Victims

A newly leaked trove of internal chat logs has exposed how the Black Basta ransomware gang leverages data broker info to research and target their victims. Black Basta is a notorious Russian-language ransomware group responsible for hundreds of cyberattacks on critical infrastructure and businesses worldwide. Known for its aggressive tactics, Black Basta has targeted majorContinue reading "Leaked Chat Logs Reveal Black Basta’s Use of Data Brokers for Targeting Victims"
Shield

Privacy Protectors Spotlight: Jeff Jockisch

In the eighth installment of our Privacy Protectors Spotlight series, we are excited to feature data privacy expert Jeff Jockisch! Jeff Jockisch is a highly regarded data privacy researcher specializing in the data broker ecosystem and commercial surveillance. His expertise spans data science, governance, and operational design, with a strong foundation in building knowledge graphs,Continue reading "Privacy Protectors Spotlight: Jeff Jockisch"
Shield

Optery Named Top InfoSec Innovator Award Winner for Attack Surface Management by Cyber Defense Magazine for 2024

We are excited to announce that Optery has won Cyber Defense Magazine’s Top InfoSec Innovator Award for Most Innovative Attack Surface Management during CyberDefenseCon 2024! We are honored to be recognized in one of the world’s most prestigious cybersecurity awards and to be among such a distinguished group of innovators. The Top InfoSec Innovator AwardsContinue reading "Optery Named Top InfoSec Innovator Award Winner for Attack Surface Management by Cyber Defense Magazine for 2024"
Shield

Protecting Employee Data As Part of Attack Surface Management

The concept of the “enterprise attack surface” refers to the sum of all possible security risk exposures for a business. Traditionally, securing this attack surface was a task focused primarily on direct IT infrastructure vulnerabilities, such as network systems, software applications, and endpoints. Aspects like exposed personally identifiable information (PII) on data broker sites, whichContinue reading "Protecting Employee Data As Part of Attack Surface Management"
Shield

Safeguard Employees: Phishing Email Protection

Phishing attacks continue to be one of the most widespread and damaging cyber threats to organizations. While new email security measures for bulk senders have made mass email phishing more difficult for attackers, spear-phishing (aimed at a single target) continues to be a top attack vector. The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) recently releasedContinue reading "Safeguard Employees: Phishing Email Protection"
Shield

Social Engineering Attacks and How Organizations Can Prevent and Defend Against Them

The vast majority of cyber attacks today begin with social engineering: the act of using exposed personal data to manipulate human targets into providing unauthorized access to an organization’s systems or data. As cybercriminals increasingly target the human element, social engineering has become the number one threat to businesses, leading to account takeovers, data breaches,Continue reading "Social Engineering Attacks and How Organizations Can Prevent and Defend Against Them"
Shield

Privacy Protectors Spotlight: Rachel Tobac

In the latest installment of our Privacy Protectors Spotlight series, we are excited to feature Rachel Tobac, a renowned expert in human hacking and social engineering defense strategies. Rachel Tobac is an ethical hacker and the CEO of SocialProof Security, a company dedicated to helping businesses and individuals protect their sensitive data from cyber threats, particularlyContinue reading "Privacy Protectors Spotlight: Rachel Tobac"
Shield

Optery Named Finalist for Attack Surface Management in Cyber Defense Magazine’s 12th Annual InfoSec Awards

Optery is excited to announce that we’ve been named a finalist in the Attack Surface Management category for the Top InfoSec Innovators Awards 2024 by Cyber Defense Magazine! We are honored to be recognized in one of the world’s most prestigious cybersecurity awards and to be among such a distinguished group of finalists. Read theContinue reading "Optery Named Finalist for Attack Surface Management in Cyber Defense Magazine’s 12th Annual InfoSec Awards"
Shield

PII Removal for Executives is Not Enough

Protecting a Broader Range of Employees is Essential Are your personal data removal efforts only focused on protecting your executives? In an era where mass SMS-phishing (smishing) campaigns and other social engineering attacks targeting non-executive staff are prevalent, extending personal data removal beyond just the C-Suite is essential. Our new whitepaper, “PII Removal for ExecutivesContinue reading "PII Removal for Executives is Not Enough"
Shield

Optery Named Winner in Three Categories by the 2024 Cybersecurity Excellence Awards

Optery is excited to announce our recognition as a winner in three categories by the 2024 Cybersecurity Excellence Awards! With over 600 entries across more than 300 categories this year, these awards celebrate excellence, innovation, and leadership in the cybersecurity industry. Optery’s recognition in these categories highlights our commitment to effectively managing exposed executive andContinue reading "Optery Named Winner in Three Categories by the 2024 Cybersecurity Excellence Awards"

Ready to safeguard your personal data?

Join the movement of people strengthening their privacy
Sign Up Free