Low-code, no-code AI is the future. Don’t fall behind.

Download whitepaper

Polymer

Download free DLP for AI whitepaper

  • Reset
Data security controls

The agentic SOC: A near reality?

Burnout has been rife within the cybersecurity sectors for years. But, this year, it seems many SOC analysts have reached breaking point. With 71% reporting burnout and 64% considering leaving the cybersecurity field altogether, it’s clear that something has to change in the security operations center (SOC).  The question is…what? Most CISOs are no stranger […]

read
Sensitive data exposure

Human risk management: The key to a culture of cybersecurity

All employees make mistakes—whether that’s a typo in an email, sending a document to the wrong person or missing a deadline.  Some mistakes, though, have greater consequences than others, especially when it comes to cybersecurity and compliance.  Sending a sensitive document to the wrong recipient, for example, can be an immediate data breach and compliance […]

read

Zoomcar data breach impacts 8.4 million users

Zoomcar, the peer-to-peer car-sharing platform that lets users rent vehicles from everyday car owners, has confirmed a major data breach. According to the company, unauthorized actors accessed its systems, compromising the personal data of roughly 8.4 million users. Here’s everything we know about the breach so far.  Zoomcar data breach: What we know so far  […]

read

Runtime data security vs DSPM

In the alphabet soup of cloud security tools, few acronyms have risen faster—or with more promise—than data security posture management (DSPM). Touted as a cure-all for sensitive data exposure, DSPM promises deep visibility into cloud environments.  But as many CISOs have found, visibility alone isn’t enough. DSPM might show you where the problems are—but it […]

read
customer service data leak

Is your customer service team a data leak waiting to happen?

On May 15, the crypto giant, Coinbase, announced that malicious actors had gotten away with the personal information of tens of thousands of customers—an incident set to cost the company nearly $400 million.  But the scale of this breach isn’t the major story. It’s how the cybercriminals did it—bribing outsourced customer service agents to steal […]

read

Texas Department of Transportation breach shows passwords aren’t enough

The Texas Department of Transportation (TxDOT) has disclosed a data breach after a threat actor accessed and downloaded 300,000 crash records from its database. The breach took place on May 12, 2025, and stemmed from a login using compromised credentials—yet another example of how a single weak link in identity security can put huge amounts […]

read
Data security and compliance

Need to know: MCP and AI security

Large language models (LLMs) like ChatGPT and Claude have become go-to tools in businesses. But they can’t do that much on their own. They’re siloed interfaces—unable to interact with all of the business applications (think: Slack, Google Workspace, Microsoft Teams) that employees use everyday. Enter the model context protocol (MCP). This new standard has been […]

read
CISO Guide to Generative AI

3 generative AI mistakes to avoid

Generative AI adoption is skyrocketing. But, in many organizations, speed is trumping strategy. As organizations rush to embrace the promise of gen AI, many are skipping critical steps around governance, security, and data integrity—and opening the door to serious risks. To help you get ahead of those risks, we’ve broken down some of the most […]

read

Coinbase insider data breach: What we know so far

Crypto exchange giant Coinbase has confirmed a significant data breach involving bribed support contractors, compromised customer information, and a $20 million extortion demand. The attack is expected to cost the company up to $400 million in remediation and reimbursements—and it didn’t involve a single line of malware.  Here’s everything we know so far.  How did […]

read

Hidden AI vulnerability risks that threaten your business data

AI tools have revolutionized how businesses operate, but they’ve also introduced significant security gaps. These AI vulnerabilities create pathways for sensitive information to leak outside your organization, often without anyone noticing until it’s too late. AI vulnerability in business environments When employees use AI tools to process business data, they create security holes. This type […]

read
Artificial intelligence

Why your business needs an AI firewall: Protecting data in the age of AI

The rapid adoption of AI tools across businesses has opened new doors for productivity and innovation. But these advancements bring significant risks. When employees use AI tools without proper safeguards, sensitive company data can leak into the wrong hands. This is where an AI firewall becomes essential. What exactly is an AI firewall? An AI […]

read

Get Polymer blog posts delivered to your inbox.