Publications:






No guidelines added yet. Add your pitching preferences to help sources craft the perfect outreach.
I want cybersecurity experts, threat intelligence groups and researchers, related experts, and those close to the story to respond to the questions and provide further details on the facts introducing the story. Risk in Shared Service Dependencies Outsourcing business functions such as document processing, customer support, and payroll leads to organizational vulnerabilities. The outsourced functions become centralized data aggregators. When one such vendor is compromised, the failure can scale to hundreds of corporate clients. In April 2026, coordinated breaches involving Frost Bank, Citizens Financial Group, and Adobe highlighted this vulnerability. It was revealed in early April that threat actors UNC6783, a.k.a. Mr. Raccoon, breached Adobe by phishing an employee at a third-party Business Process Outsourcing (BPO) firm in India, escalating privileges to a manager’s account, and exporting 13 million customer support tickets from a single terminal. Adobe’s internal networks remained completely untouched. That same month, the Everest ransomware group compromised Frost Bank and Citizens Financial by breaching a shared document-production vendor, exposing the personal data of 3.4 million customers of Citizens Financial and 250,000 customers of Frost Bank without ever accessing the banks’ internal networks. 1. Which specific service provider industries currently accumulate the highest volumes of corporate client data on their own infrastructure? 2. What egress filtering standards and rate-limiting protocols can organizations enforce within a vendor’s environment to detect and block mass data exports from a single contractor terminal? 3. Why do modern customer relationship management (CRM) and data-sharing interfaces fail to restrict vendor access based on the context of individual business transactions? 4. When will enterprise clients begin mandating zero-knowledge architecture and end-to-end encryption in third-party service-level agreements to keep outsourced data unreadable to the vendor? 5. How can corporate security teams technically audit the data storage and disposal practices of their external partners to map total data exposure without relying on paper-based compliance questionnaires? 6. How can identity providers configure behavioral analytics to flag an authorized third-party account when its interaction with data suddenly deviates from standard operational baselines?
Deadline: Jun 2nd, 2026 8:00 PM ET
•Communications of the ACM
Deadline: Apr 17th, 2026 8:00 PM ET
•Communications of the ACM
•0 responses
Deadline: Apr 17th, 2026 8:00 PM ET
•Communications of the ACM
•3 responses
Deadline: Apr 14th, 2026 8:00 PM ET
•Communications of the ACM
•10 responses
Deadline: Feb 24th, 2026 8:00 PM ET
•The Communications of the ACM
•20 responses