Polymer

Download free DLP for AI whitepaper

  • Reset
Cloud security

Cybersecurity Perspectives from a Former FBI Agent

Kevin Kline, a 30+ year veteran of the FBI with a focus on National Security investigations, has dealt with cyber threats globally. He is currently helping organizations negotiate ransomware and develop defensive policies of protecting against insider threats. In this interview, he speaks to us about:

read
CISOs and Polymer

What is CASB, & why it matters

Cloud-hosted products come with data exfiltration risks that are not well understood. This has definitely been heightened by remote teams and haphazard cloud adoption during COVID-19. Today’s IT teams face a multitude of cloud security challenges: managing remote access to applications; preventing data leakage, ensuring users are who they see are; watching for malware and […]

read
Software false positives

The ugly truth about security software: getting buried under too many false positives

False positives are expensive!! According to a Critical Start survey, for every sixty minutes security operations centers (SOCs) run, fifteen minutes are wasted on false positives.   Further, the study reveals that, on average, a typical organization wastes 286 to 486 hours per week on false positives. Image Source What are false positives? False positives are alarming […]

read
Finance

How are security leaders thinking of 2021 budgets

The rapid rate at which security technology is evolving can make it challenging to evaluate and measure the success of security systems. However, you can properly monitor the effectiveness of your security system and strategy by clearly identifying your desired outcomes and aligning them with your budget. Cisco Secure conducted the Security Outcomes Study in 2020 to […]

read
dlp software data loss prevention software dlp systems

Common SaaS security threats for financial institutions & how to prevent them

When HelpSystems surveyed 250 CIOs and CISOs in financial institutions to learn about their top cyber concerns and challenges, 35% of respondents cited insider threats as having the potential to cause the most damage in a year. This statistic is representative of the pervasive fear financial institutions have of insider security threats, which could prove to be […]

read
behavior_sci

Behavioral science approaches towards better security outcomes

If politicians use it, then why shouldn’t enterprises? We’re talking about nudging – a form of behavioral science. The theory behind nudging is that, by presenting information in a new way, you can gently influence people towards making better choices.  The concept rose to prominence in the Obama administration, when Obama made Cass Sunstein, the […]

read
Data Breach

Accidental data breaches: 3 golden rules for effective cybersecurity training

Accidental data breaches are a big and rising cost for businesses. Ponemon research shows that the majority (62%) of insider threats are caused by employee negligence or human error, with the average incident costing businesses $307,000 each time. The rise of remote working, as a result of the pandemic, has created an even more fertile environment for […]

read

Insider trading in the post-SPAC (& Reddit) era: Who’s minding your Slack Connect & Teams?

Reddit groups behind large stock moves recently are presumably bringing the power of the masses against Wall Street. While this is technically legal, a lesser publicized shift is happening in how insider trading is proliferating via SaaS communication tools. The proliferation of SPACs is creating more opportunities for ‘small exchange of info’ to make dramatic […]

read
Insider threat detection

Insider threat protection for financial services: implementation challenges for SaaS applications

Research from HelpSystems surveyed 250 CIOs and CISOs in financial institutions and found that 35% found insider threats to have the potential to cause the most damage over the next 12 months. This statistic goes to show the purveying fear that surrounds financial institutions with insider security threats that could prove to be quite costly to them […]

read
SolarWinds breach

SolarWinds-related vulnerability caused Microsoft source code breach

The SolarWinds-related break-in into Microsoft source code should be a wake-up call to all organizations big or small. This was not due to source-code vulnerabilities but via ‘internal’ intrusion where the bad guys got inside the organization through other parts of the technology perimeter.  Code vulnerability and tighter access mechanisms is one part of cybersecurity, data protection […]

read
Cloud security

Are offshore engineers a security risk?

‍ Hiring offshore security engineers is more common than ever post-pandemic. While it’s cost effective, hiring an engineer from outside the country comes with a number of security risks. The following are five reasons why you should closely consider the implications of offshoring your data security: 1. Non-disclosure agreements are impossible to enforce Many IT […]

read

Get Polymer blog posts delivered to your inbox.