IDC Names Securiti a Worldwide Leader in Data Privacy


The Twitter Whistleblower

Exposing the Truth of Sensitive Data Exposure

This infographic explains:

  • Data security lapses that the Twitter whistleblower revealed.
  • The significant causes of data sprawl in a hybrid data environment.
  • The Data Command Center framework and how it addresses data obligations.
  • How to operationalize UDC for deeper intelligence and control across data on all clouds.


Award-winning technology, built by a proven team, backed by confidence. Learn more.

When Peiter "Mudge" Zatko, former head of security at Twitter, agreed to testify before Congress, most expected the testimony to have a defining impact on Elon Musk's impending takeover of Twitter. However, it brought to light some shocking data security and management revelations.

Zatko’s revelation of large organizations’ lack of awareness of what data they have and where it resides in their data environment raises serious concerns regarding the security, privacy, governance, and compliance obligations around data.

The source of that problem can be many, but the ideal solution lies in a unified framework that gives intelligence and control over all data across all the clouds. Download the infographics to learn more about why organizations tend to lose sight of their data, how it leads to serious sensitive data security risks, and how a unified framework helps organizations address obligations around data.

Download Now
The Twitter Whistleblower

People Also Ask:

Here are some other frequently asked questions users have:

On October 28, 2022, the Securities and Exchange Commission confirmed that Elon Musk had finally completed his $44 billion takeover of Twitter.

Twitter earns most of its revenue in two ways. The first is data licensing, where it sells subscriptions to public data to companies and developers, allowing better insights in real-time and historically about platform trends and user demographics. Secondly, through good old-fashioned digital advertising, companies are able to place their ads throughout Twitter's feed.

Back in April 2022, Twitter adopted a limited-duration shareholder rights plan. Known informally as a "poison pill", such a plan is often used to fend off potentially hostile takeover bids by diluting the stake of the entity that intends to complete the takeover. In simpler terms, Twitter's board tried to increase the number of Twitter shares to ensure Elon Musk would not have the necessary majority number of shares to complete his hostile takeover.

Like any tech company, Twitter has the mechanisms to know a great deal about its users. Firstly, there’s the information a user willfully provides Twitter when setting up their profile, such as location, language, and name. Then, since Twitter has access to a user’s IP address, it can triangulate a user’s location, sometimes in real time. Twitter’s own privacy policy states that a user’s tweets or interactions are available to third parties via programming interfaces. Using this information, advertisers can piece together a portrait of a person’s political leanings and consumer behavior, thus targeting them more effectively with ads and content more likely to get their engagement.

Any publicly available data can be scraped from Twitter. Additionally, any data that can be accessed, viewed and downloaded without needing a Twitter account can be scraped off.

In short, yes. Twitter has access to the IP address when you connect to the WiFi at your home or office. Using this information, an individual’s Twitter account can be traced to the person to whom the account belongs.

All-in-One Solution For Your Business Needs

The Multi-disciplinary practice to grow trust-equity of your brand and comply with privacy regulations

Top 7 Employer’s Privacy Obligations

Discover employer privacy obligations in the remote work era. Download our white paper for insights today.

8 Privacy Tips for a Successful Marketer

Explore 8 privacy tips by Securiti experts for ethically collecting personal data in marketing.

The 7 Sins of Data Privacy Management

Find out why following data compliant practices from the experts is important, and learn how to begin protecting data privacy today.