Data loss prevention and compliance are critical functions for any company, especially when more employees than ever are working from home and creating unstructured, unsecured data without the traditional safeguards. Here we cover the essential questions to ask when choosing a SaaS solution for your organization. Data Loss Prevention (DLP) & compliance for SaaS applications: […]

WEBINAR: implementing compliance, security & privacy (perspectives from high growth fintechs)
Join us on Sept. 22 at 12pm ET as we discuss the following agenda: How banks and fintechs deal with today’s new remote working environment Day 0 security mindset, security-based company stack Compliance frameworks that actually work Tech-stack and tooling considerations

Release notes: Polymer DLP VCO for Github & Bitbucket
High level feature notes for code scanner integrations -Scan a set of pre-defined repositories to identify Org-level sensitive data within codebase -Repositories can be scanned in the following ways: Polymer DLP VCO for Github & Bitbucket Get it here Features *Contact us for Enterprise features and additional support options Polymer protects against data loss (DLP) […]

Are CASBs the panacea for cloud security?
A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure. A CASB is the security guard allowing the organization to extend security frameworks on private and public cloud environments. We look into the features, benefits and shortcomings of CASB solutions in this article. 4 features […]

Database access controls & hidden data breach risks
Most data breaches from inside the organizations are still due to unfettered database access. It is critical for any executive to have a basic understanding of what database controls look like from a practical standpoint and understand off-the-radar areas of data breach risk. Typical onboarding of an employee or contractor requires assigning database access. […]

7 Team culture tips to drive cybersecurity & privacy
The best cybersecurity and privacy regimes will never work if your team members do not actively protect company efforts. Here is the precursor to how top-down security infrastructures have shortcomings. Instead, think how you can drive security from the ground up: with the support of each and every team member that contributes to your project. Here […]

Privileged access of information in an enterprise: brief History & the future
Perimeter security has historically provided the analogy of protecting the keys to the kingdom for Enterprises. Once you have been approved to enter the drawbridge which typically consists of verifications such as password, VPN, 2-Factor, a user can have access to all the data and applications within the castle. However once you are in the […]

Using natural language processing (NLP) based sentiment analysis for risk & trading: mixed bag!
We have built and/or integrated various machine learning (ML) models over the years within Financial Services. The success of these projects generally lie in tight requirements and good data quality. Following are some takeaways based on NLP work we did for an investment bank’s trading desk based in NYC (used with permission of course). Reason […]

Is your codebase leaking sensitive data?
Pressure leads to shortcuts. Commenting in code is one of those shortcuts and shortcuts can introduce risks. A typical issue with commented code? Confidential data is left exposed. Maybe the programmer intended to edit it out – or simply didn’t think of it as consequential. Comments with exposed data is not a huge issue when […]

Offshore development teams: data breach & security risks abound!
Large number of businesses leverage offshore technology teams. However, very few of those companies have data governance on customer data nor understanding of the cyber-security risks involving some amazing and cheap talent. Chances of breaching GDPR, CCPA and other global privacy regulations is high when working with offshore development teams. Risks of working with remote and […]