Polymer

Download free DLP for AI whitepaper

  • Reset
slack security concerns slack security breach slack security issues

How did Slack lead to ‘Grand Theft Auto’ leak?

Gaming fans got an unexpected treat last weekend when in-development gameplay footage of the upcoming Grand Theft Auto (GTA) game was leaked online. No, this wasn’t an attempt by Rockstar Games—the publisher of GTA— to drum up anticipation for the pending launch.  The company was hacked. And badly. The hacker managed to break into an […]

read
Cybersecurity training

How to win at cybersecurity training for remote & hybrid employees

If you’re like most organizations with knowledge workers, you probably allow your employees to work remotely at least some of the time. This trend is on the rise and, by 2028, it’s expected that 75% of organizations across the world will enable hybrid and remote work. While the work-from-anywhere approach has its perks, it also […]

read
Uber Slack Database Breach

How did Uber’s Slack breach lead to leakage of database credentials?

Uber has been hacked by an 18 year old. Yep, you read that right. On the 15th September, tens of Uber employees received a Slack message from an unknown identity, stating “I am a hacker.”   But that’s just the tip of the iceberg. The threat actor’s self-announcement was the final step in a lengthy data […]

read
CISO Guide to Generative AI

The demise of email & the rise of in-SaaS communication presents unique data security risks

Until recently, email was the primary mode of communication in workplaces across the globe. Then, the pandemic hit and organizations quickly had to pivot their approach to collaboration. Enter cloud apps like Slack, Microsoft Teams and Google Workspace, which are perfect for rapid, remote communication amongst employees. Even now, as life returns to normal, these […]

read
Compliance - CPRA and HR data

Is employee & B2B personal data covered under the CPRA?

On August 31st, the California legislative session notably adjourned without the enactment of Assembly Bill 1102. This bill would have extended the exemption for the inclusion of employee and B2B personal data within the California Privacy Rights Act (CPRA). Without the exemption in place, compliance and governance around B2B and HR personal information will become […]

read
Slack data security

Slack for healthcare—Do’s, don’ts, & best practices

So, you’re a healthcare organization that’s started using Slack? Chances are, you want to help your employees communicate and collaborate more effortlessly, and you’ve heard on the grapevine that Slack is the collaboration tool to use. We’ve heard the same. Slack adoption is soaring. The company generated $902 million in revenue between March 2020 and […]

read
SAAS with DLP

How to set up zero trust for your SaaS tech stack

Data loss has long been a challenge for organizations. Even in the good old days when company data was stored on-premises, worries about data loss kept IT and security leaders up at night.  Today’s waking nightmare, of course, is the threat of data loss through SaaS applications and cloud infrastructure. In this environment, securing data […]

read
LastPass breach

I am a LastPass customer. Does the breach affect me?

Over the weekend, the popular password management tool, LastPass, published a blog post, letting its customers know that it suffered a data breach. Here’s everything you need to know. What’s LastPass? LastPass is a very well known security tool used by individuals and organizations alike to streamline password management.  Essentially, LastPass works by storing all […]

read
Twitter Whistleblower Allegations

5 lessons to be learned from Twitter whistleblower allegations

You’d think that a technology company as large and influential as Twitter would be hot on the case of data privacy and cyber security. Well, recent allegations claim the opposite is true.  This week, an 84-page whistleblower report hit the headlines, featuring damning allegations about Twitter’s security practices. This is a report with weight. It […]

read
VPN security remote work

Why a VPN isn’t enough to secure remote work!

VPN stands for Virtual Private Network. There are two types of VPNs: personal ones and corporate ones. Personal VPNs are the likes of NordVPN and Surfshark, which enhance users’ privacy as they browse the internet. These services can also be used to unblock geo-restricted applications and websites.  Then there are corporate VPNs – which are […]

read
Microsoft Office 365 Russian Hack

How did russian hackers target Microsoft Office 365 accounts?

Background on Cozy Bear Cozy Bear is a Russian cyber-espionage group classified by the United States federal government as advanced persistent threat 29 (APT29).  It’s responsible for several high-profile data breaches over the last few years, including the SolarWinds attack and recent Google Drive phishing scams.  While APT29 is notorious in the public domain, the group’s infamy hasn’t […]

read

Get Polymer blog posts delivered to your inbox.