Securiti announces a $75M Series C Funding Round


The Twitter Whistleblower

Exposing the Truth of Sensitive Data Exposure

This infographic explains:

  • Data security lapses that the Twitter whistleblower revealed.
  • The significant causes of data sprawl in a hybrid data environment.
  • The Unified Data Controls framework and how it addresses data obligations.
  • How to operationalize UDC for deeper intelligence and control across data on all clouds.


Award-winning technology, built by a proven team, backed by confidence. Learn more.

When Peiter "Mudge" Zatko, former head of security at Twitter, agreed to testify before Congress, most expected the testimony to have a defining impact on Elon Musk's impending takeover of Twitter. However, it brought to light some shocking data security and management revelations.

Zatko’s revelation of large organizations’ lack of awareness of what data they have and where it resides in their data environment raises serious concerns regarding the security, privacy, governance, and compliance obligations around data.

The source of that problem can be many, but the ideal solution lies in a unified framework that gives intelligence and control over all data across all the clouds. Download the infographics to learn more about why organizations tend to lose sight of their data, how it leads to serious sensitive data security risks, and how a unified framework helps organizations address obligations around data.

Download Now
The Twitter Whistleblower

People Also Ask:

Here are some other frequently asked questions users have:

On October 28, 2022, the Securities and Exchange Commission confirmed that Elon Musk had finally completed his $44 billion takeover of Twitter.

Twitter earns most of its revenue in two ways. The first is data licensing, where it sells subscriptions to public data to companies and developers, allowing better insights in real-time and historically about platform trends and user demographics. Secondly, through good old-fashioned digital advertising, companies are able to place their ads throughout Twitter's feed.

Back in April 2022, Twitter adopted a limited-duration shareholder rights plan. Known informally as a "poison pill", such a plan is often used to fend off potentially hostile takeover bids by diluting the stake of the entity that intends to complete the takeover. In simpler terms, Twitter's board tried to increase the number of Twitter shares to ensure Elon Musk would not have the necessary majority number of shares to complete his hostile takeover.

Like any tech company, Twitter has the mechanisms to know a great deal about its users. Firstly, there’s the information a user willfully provides Twitter when setting up their profile, such as location, language, and name. Then, since Twitter has access to a user’s IP address, it can triangulate a user’s location, sometimes in real time. Twitter’s own privacy policy states that a user’s tweets or interactions are available to third parties via programming interfaces. Using this information, advertisers can piece together a portrait of a person’s political leanings and consumer behavior, thus targeting them more effectively with ads and content more likely to get their engagement.

Any publicly available data can be scraped from Twitter. Additionally, any data that can be accessed, viewed and downloaded without needing a Twitter account can be scraped off.

In short, yes. Twitter has access to the IP address when you connect to the WiFi at your home or office. Using this information, an individual’s Twitter account can be traced to the person to whom the account belongs.

All-in-One Solution For Your Business Needs

The Multi-disciplinary practice to grow trust-equity of your brand and comply with privacy regulations

View More

Indonesia’s Personal Data Protection Law (PDPL)

Indonesia’s Protection of Personal Data Law (PDPL) was ratified on 20th September 2022. The new law aims to provide Indonesian citizens with adequate data protection on par with other major data regulations globally.

View More

A Brief Overview of Global Privacy Control (GPC)

Global Privacy Control (GPC) is an initiative to create a global technical specification designed to communicate a consumer’s privacy preferences to data controllers and processors.

View More

FIFA Cybersecurity Framework Privacy Impact Assessment

Here are some fundamental practices that can help you conduct a thorough and effective Privacy Impact Assessment (PIA) as required per the FIFA Cybersecurity Framework.

View More

The Evolving Landscape of European Data Privacy Laws

Take proactive approach by mandating corporations to protect users' personal data

View More

Avoiding the Pitfalls of CPRA Non-Compliance

California’s next wave of privacy legislation, the California Privacy Rights Act (CPRA), also known as Proposition 24, was approved by California voters on November 3, 2020.

View More

CDMC Readiness Assessment Checklist

CDMC assessment provides insight into how many of the best practices are presently in place around cloud adoption.

View More

Legacy Privacy Framework vs. Modern Privacy Framework

Legacy Privacy Framework vs. Modern Privacy Framework

At Securiti, our mission is to enable enterprises to safely harness the incredible power of data and the cloud by controlling the complex security, privacy and compliance risks.


Users love Securiti on G2 G2 leader spring 2022 G2 leader summer 2022 G2 leader easiest business 2022 RSAC Leader Forrester Badge IAPP Innovation award 2020 Gartner Cool Vendor Award Sinet Innovator Award