Polymer

Download free DLP for AI whitepaper

  • Reset
hiring-infosec-engineer

What makes a good security engineer? 7 traits to look for when hiring

So, you’ve started the process of hiring a security engineer. Your job ad is live, and you’ve already received a few resumes. As you begin to line up your interviews, you’re wondering how you’ll know when you’ve found the right candidate. The right security professional needs to be more than an excellent cultural fit. They […]

read
SEC disclosure requirements

Hiring a compliance analyst? 5 traits to look for

A good compliance team can make the difference between a company that is successful vs not. Risks related to reputation, enterprise, technology, people, third party are just some of the areas that a compliance team gets involved in. Finding the right candidate is challenging but keeping these traits in mind can help look for good […]

read
Twitch Data Leak

How did the Twitch data leak happen? (Hint: unpaid privacy debt)

Twitch, the live-streaming platform from Amazon, recently announced that it suffered an enormous data breach that exposed the company’s source code, users’ income streams and more. The breach was posted on the message board 4chan, a popular hacker forum. Worryingly, the hacker’s post suggested that this leak was just the start. It labelled the post […]

read
DLP for Healthcare

Webinar: protecting against ransomware: healthcare edition (4 takeaways)

In honor of cybersecurity month in the US and Europe, Polymer’s CEO, Yasir Ali, recently spoke in a webinar about the growing prevalence of ransomware attacks – and how hospitals, medical providers and other healthcare organizations can protect themselves. Here are 4 Key Takeaways: Takeaway 1: Ransomware is as scary as it sounds Not to […]

read
DSPM vs CSPM

Cloud security challenges of privacy policy management

Becoming data-driven is a critical priority for organizations of all shapes and sizes. Data, combined with analytics, equals insights – and these insights can form the basis of predictions, better customer relationships and informed decisions. However, in the modern world, generating data insights comes with great responsibility. A lot of data, after all, relates to […]

read
Insider threat detection

Top 7 DLP fails

Data loss prevention (DLP) is meant to do exactly what it says on the tin: prevent data loss. For today’s enterprises, this is a huge concern. Who doesn’t want to protect their reputation, assets, and bottom line from the fallout of a data breach or compliance fine? In line with this, the DLP market is […]

read
Cybersecurity

Guide: what is data discovery, & why is it essential?

I. Introduction 1. Definition 2. Concepts – Manual – Smart II. Importance III. Processes 1. Data preparation 2. Visual analysis 3. Guided analytics IV. Conclusion  Introduction We want to start this article by casting your mind back to the prime days of public libraries. We know that they still exist, but we also know that […]

read
critical data elements

What are critical data elements (CDE), & why are they so critical for security?

Data protection and data governance are two important facets of every organization’s cybersecurity and compliance strategy. Not only that, but they’re essential to keeping things running. If your people can’t find the data they need, or it’s difficult to use, this could cause a number of problems. Plus, with the advent of both state and […]

read
MS PowerApps Breach

Missed-configuration: the MS PowerApps fiasco

When you hear the words: “Microsoft” and “data breach” in the same sentence, chances are your eyes will widen with panic. The ubiquity of Microsoft’s software and hardware means that most organizations and people interact with the brand in one way or another. Whether it’s Teams, Office 365, or Power Apps, Microsoft is everywhere. The […]

read
Atlassian SaaS Data Breach

NewsAlert: Confluence at risk

Atlassian Confluence vulnerability On August 25th, Atlassian released a statement warning about the critical remote code execution vulnerability (CVE-2021-26084). According to the company, the vulnerability affected the Confluence server and Confluence data center. What is the CVE-2021-26084 vulnerability?  The vulnerability involves an Object-Graph Navigation Language (OGNL) injection flaw on Atlassian’s Confluence server and data center […]

read
Phishing Phishing Scams

Phishing activity trends for 2021

The APWG Phishing Activity Trends report for the first quarter of 2021 paints a grim picture. According to the report, the number of phishing websites peaked in January 2021, reaching record-setting highs of 245,771. While phishing-related scams dwindled later in the quarter, March saw well over 200,000 incidents, the 4th highest number ever reported by […]

read

Get Polymer blog posts delivered to your inbox.