Polymer

Download free DLP for AI whitepaper

  • Reset
DSPM vs CSPM

Cloud security challenges of privacy policy management

Becoming data-driven is a critical priority for organizations of all shapes and sizes. Data, combined with analytics, equals insights – and these insights can form the basis of predictions, better customer relationships and informed decisions. However, in the modern world, generating data insights comes with great responsibility. A lot of data, after all, relates to […]

read
Insider threat detection

Top 7 DLP fails

Data loss prevention (DLP) is meant to do exactly what it says on the tin: prevent data loss. For today’s enterprises, this is a huge concern. Who doesn’t want to protect their reputation, assets, and bottom line from the fallout of a data breach or compliance fine? In line with this, the DLP market is […]

read
Cybersecurity

Guide: what is data discovery, & why is it essential?

I. Introduction 1. Definition 2. Concepts – Manual – Smart II. Importance III. Processes 1. Data preparation 2. Visual analysis 3. Guided analytics IV. Conclusion  Introduction We want to start this article by casting your mind back to the prime days of public libraries. We know that they still exist, but we also know that […]

read
critical data elements

What are critical data elements (CDE), & why are they so critical for security?

Data protection and data governance are two important facets of every organization’s cybersecurity and compliance strategy. Not only that, but they’re essential to keeping things running. If your people can’t find the data they need, or it’s difficult to use, this could cause a number of problems. Plus, with the advent of both state and […]

read
MS PowerApps Breach

Missed-configuration: the MS PowerApps fiasco

When you hear the words: “Microsoft” and “data breach” in the same sentence, chances are your eyes will widen with panic. The ubiquity of Microsoft’s software and hardware means that most organizations and people interact with the brand in one way or another. Whether it’s Teams, Office 365, or Power Apps, Microsoft is everywhere. The […]

read
Atlassian SaaS Data Breach

NewsAlert: Confluence at risk

Atlassian Confluence vulnerability On August 25th, Atlassian released a statement warning about the critical remote code execution vulnerability (CVE-2021-26084). According to the company, the vulnerability affected the Confluence server and Confluence data center. What is the CVE-2021-26084 vulnerability?  The vulnerability involves an Object-Graph Navigation Language (OGNL) injection flaw on Atlassian’s Confluence server and data center […]

read
Phishing Phishing Scams

Phishing activity trends for 2021

The APWG Phishing Activity Trends report for the first quarter of 2021 paints a grim picture. According to the report, the number of phishing websites peaked in January 2021, reaching record-setting highs of 245,771. While phishing-related scams dwindled later in the quarter, March saw well over 200,000 incidents, the 4th highest number ever reported by […]

read
reasons why security training fails

Top 5 reasons why security trainings fail?

The cybersecurity training market is “globally exceeds $1 billion in annual revenue” and is constantly growing at about 13 percent per year(KnowBe4). An employees’ actions can damage an organization’s security and lead to many large expenses due to information breaches. Employees (and their corresponding mistakes) are the single biggest security risk for organizations.  An average […]

read
T-Mobile Data Breach

How did T-Mobile breach occur?

Mobile carrier T-Mobile suffered a massive data breach recently, the 5th such occurrence in the last four years. Preliminary analysis revealed that the breach affected nearly eight million current postpaid customers and forty million former or prospective clients who had applied for credit with the company. The compromised data is as sensitive as it could […]

read
generative AI

IP spoofing: what it is, & how to protect against it

Back in 2011, a botnet managed to infect an estimated 1 million computers worldwide. Known as GameOver Zeus, the infamous malware was programmed to specifically steal banking credentials. It then used the captured banking information to initiate or re-direct wire transfers, managing to steal over $100 million from individual users, businesses and organizations. It took […]

read
CISOs and Polymer

DO NOT Go all-in on a XDR & SASE solutions ..just yet!

Another day, another security acronym splashed across vendor marketing brochures. In present times, the most popular term you’ve probably come across is SASE, which is enjoyably pronounced like ‘sassy’. SASE stands for secure access service edge. While the term is everywhere at the moment, if you’re an MSSP looking to bolster your security offering to […]

read

Get Polymer blog posts delivered to your inbox.