Polymer

Download free DLP for AI whitepaper

  • Reset
SaaS and SSPM DLP

DLP for SaaS: buyer’s guide

Data loss prevention and compliance are critical functions for any company, especially when more employees than ever are working from home and creating unstructured, unsecured data without the traditional safeguards. Here we cover the essential questions to ask when choosing a SaaS solution for your organization. Data Loss Prevention (DLP) & compliance for SaaS applications: […]

read

WEBINAR: implementing compliance, security & privacy (perspectives from high growth fintechs)

Join us on Sept. 22 at 12pm ET as we discuss the following agenda: How banks and fintechs deal with today’s new remote working environment Day 0 security mindset, security-based company stack Compliance frameworks that actually work Tech-stack and tooling considerations

read

Release notes: Polymer DLP VCO for Github & Bitbucket

High level feature notes for code scanner integrations -Scan a set of pre-defined repositories to identify Org-level sensitive data within codebase -Repositories can be scanned in the following ways: Polymer DLP VCO for Github & Bitbucket Get it here Features *Contact us for Enterprise features and additional support options Polymer protects against data loss (DLP) […]

read

Are CASBs the panacea for cloud security?

A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure. A CASB is the security guard allowing the organization to extend security frameworks on private and public cloud environments. We look into the features, benefits and shortcomings of CASB solutions in this article. 4 features […]

read
Data Breach

Database access controls & hidden data breach risks

Most data breaches from inside the organizations are still due to unfettered database access. It is critical for any executive to have a basic understanding of what database controls look like from a practical standpoint and understand off-the-radar areas of data breach risk.   Typical onboarding of an employee or contractor requires assigning database access. […]

read
Cybersecurity training

7 Team culture tips to drive cybersecurity & privacy

The best cybersecurity and privacy regimes will never work if your team members do not actively protect company efforts. Here is the precursor to how top-down security infrastructures have shortcomings. Instead, think how you can drive security from the ground up: with the support of each and every team member that contributes to your project. Here […]

read
Cloud security

Privileged access of information in an enterprise: brief History & the future

Perimeter security has historically provided the analogy of protecting the keys to the kingdom for Enterprises. Once you have been approved to enter the drawbridge which typically consists of verifications such as password, VPN, 2-Factor, a user can have access to all the data and applications within the castle. However once you are in the […]

read

Using natural language processing (NLP) based sentiment analysis for risk & trading: mixed bag!

We have built and/or integrated various machine learning (ML) models over the years within Financial Services. The success of these projects generally lie in tight requirements and good data quality. Following are some takeaways based on NLP work we did for an investment bank’s trading desk based in NYC (used with permission of course). Reason […]

read
data privacy, data protection

Is your codebase leaking sensitive data?

Pressure leads to shortcuts. Commenting in code is one of those shortcuts and shortcuts can introduce risks. A typical issue with commented code? Confidential data is left exposed. Maybe the programmer intended to edit it out – or simply didn’t think of it as consequential. Comments with exposed data is not a huge issue when […]

read
Data breach

Offshore development teams: data breach & security risks abound!

Large number of businesses leverage offshore technology teams. However, very few of those companies have data governance on customer data nor understanding of the cyber-security risks involving some amazing and cheap talent. Chances of breaching GDPR, CCPA and other global privacy regulations is high when working with offshore development teams.  Risks of working with remote and […]

read

Get Polymer blog posts delivered to your inbox.