Back

Dune Security Takes Over Times Square

In less than three years, Dune Security has grown from an idea into a platform trusted by Fortune 1,000 enterprises. Our Times Square milestone celebrates that journey and our mission to stop insider threats and social engineering at scale.

Minutes to listen:
by Dune Research Team
16 Sep 2025
4 min read
September 16, 2025

FAQs

Complete the form below to get started.

What makes Times Square a milestone for Dune Security?
What makes Dune Security’s platform different?
Why is solving user risk so important?
Why are social engineering and insider threats especially dangerous today?
What does the Times Square milestone reveal about Dune Security’s culture?

Explore Our Latest Insights

Stay updated ith our expert insights and tips
View all
Modern corporate boardroom with a long conference table and executive chairs inside a glass-walled meeting space overlooking a city skyline, representing board-level governance and cybersecurity leadership discussions.

Making Cyber Risk Board Ready: Strategies for Winning Boardroom Confidence

Winning board confidence on cyber risk requires more than technical reporting. Security leaders need to support better governance decisions and communicate exposure in a way directors can act on.

Blog
Person filing IRS 1040 tax return at office desk with financial paperwork and cash, representing tax season refund processing and tax scam risk.

Tax Season Scams: How Refund Fraud Escalates Into Enterprise Risk

Each filing season, threat actors execute coordinated, identity-driven campaigns that begin with refund fraud and rapidly escalate into credential harvesting and enterprise exposure.

Blog

The User Is Still the Weakest Link - Now What?

Dune Security CEO David DellaPelle joins Secure Insights to break down why user risk drives breaches, how AI is accelerating social engineering, and why legacy awareness models are no longer effective.

Featured Podcasts

Never Miss a Human Risk Insights

Subscribe to the Dune Risk Brief - weekly trends, threat models,
and strategies for enterprise CISOs.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.