Polymer

Download free DLP for AI whitepaper

  • Reset
Twitter Whistleblower Allegations

5 lessons to be learned from Twitter whistleblower allegations

You’d think that a technology company as large and influential as Twitter would be hot on the case of data privacy and cyber security. Well, recent allegations claim the opposite is true.  This week, an 84-page whistleblower report hit the headlines, featuring damning allegations about Twitter’s security practices. This is a report with weight. It […]

read
data privacy, data protection

No, using a VPN is not enough security for remote work

VPN stands for Virtual Private Network. There are two types of VPNs: personal ones and corporate ones. Personal VPNs are the likes of NordVPN and Surfshark, which enhance users’ privacy as they browse the internet. These services can also be used to unblock geo-restricted applications and websites.  Then there are corporate VPNs – which are […]

read
Microsoft Office 365 Russian Hack

How did russian hackers target Microsoft Office 365 accounts?

Background on Cozy Bear Cozy Bear is a Russian cyber-espionage group classified by the United States federal government as advanced persistent threat 29 (APT29).  It’s responsible for several high-profile data breaches over the last few years, including the SolarWinds attack and recent Google Drive phishing scams.  While APT29 is notorious in the public domain, the group’s infamy hasn’t […]

read
Cisco breach

How did Cisco get hacked?

Overview of the Cisco data breach  On Wednesday, August 10th, 2022, the networking giant, Cisco, confirmed that it suffered a data breach on 24th May of this year. Below, we’ll talk you through how the hack happened, what data was lost and who was responsible.  We’ll also discuss key learnings from the incident, so you […]

read
Dropbox Google Drive Phishing Scam

How do Google Drive and Dropbox phishing scams work?

We all know what a traditional phishing scam is, where a cyber-criminal sends a fraudulent email to their victim in a bid to trick them into sharing sensitive information or downloading malware.  Phishing scams are so widespread that most email providers have now installed impressive features that block standard phishing emails. However, just because email […]

read
Twilio Data Breach

Twilio data breach: What happened and lessons to be learned

Over the weekend, the US-founded communications company, Twilio, disclosed that it suffered a data breach, after some of its employees fell for a sophisticated phishing scam. Below, we’ll give you an overview of the security incident: what happened, who was impacted and how you can prevent the same thing happening in your organisation. Quick background: […]

read
Proxy Based SaaS Security

What is autonomous compliance?

On top of this, frameworks like ISO 27001 and SOC 2 are fast becoming expectations for companies that supply goods and/or services to other organizations.  With so much to consider, many compliance and security leaders may feel like they’re fighting an uphill battle. For all their efforts to meet compliance demands, they’re always a step […]

read

What is UEBA? How does it help protect against insider threats?

What is UEBA? UEBA is an acronym for User and Entity Behavior Analytics. This breed of security solution harnesses the power of technologies like machine learning and artificial intelligence to monitor your users’ behavior for signs of compromise.  Essentially, UEBA solutions analyze your users and other entities – like endpoints and routers – to create […]

read

CCPA: the enforcements so far

The California Consumer Privacy Act (“CCPA”) came into force in 2020 and, since then, plenty of organizations have received notifications from the California attorney general about their data security practices.  In this blog, we’ll take a look through some of the most recent enforcements, so that your company can make sure it doesn’t fall into […]

read
SaaS and SSPM DLP

CMMC 2.0 makes SaaS data loss prevention monitoring a must-have

A couple of months ago, we wrote about CMMC 2.0, the second iteration of the Department of Defense’s Cybersecurity Maturity Model Certification. The revamped CMMC 2.0 is meant to be easier to implement for small and medium-sized businesses, so that contractors and suppliers of all sizes are able to meet the DOD’s cybersecurity requirements.  If […]

read
Data Loss Prevention

Recession, resignations & risks of data loss!

Great resignation and the upcoming recession is creating large employee turnover that puts company data at risk of theft and loss.

read

Get Polymer blog posts delivered to your inbox.