Run a free Slack or Google Drive scan now

  • Reset
UEBA insider threats

What is UEBA? How does it help protect against insider threats?

What is UEBA? UEBA is an acronym for User and Entity Behavior Analytics. This breed of security solution harnesses the power of technologies like machine learning and artificial intelligence to monitor your users’ behavior for signs of compromise.  Essentially, UEBA solutions analyze your users and other entities – like endpoints and routers – to create […]

read more
CCPA enforcements

CCPA: the enforcements so far

The California Consumer Privacy Act (“CCPA”) came into force in 2020 and, since then, plenty of organizations have received notifications from the California attorney general about their data security practices.  In this blog, we’ll take a look through some of the most recent enforcements, so that your company can make sure it doesn’t fall into […]

read more
CMMC 2.0

CMMC 2.0 makes SaaS data loss prevention monitoring a must-have

A couple of months ago, we wrote about CMMC 2.0, the second iteration of the Department of Defense’s Cybersecurity Maturity Model Certification. The revamped CMMC 2.0 is meant to be easier to implement for small and medium-sized businesses, so that contractors and suppliers of all sizes are able to meet the DOD’s cybersecurity requirements.  If […]

read more

Recession, resignations & risks of data loss!

Great resignation and the upcoming recession is creating large employee turnover that puts company data at risk of theft and loss.

read more

What is cloud account hijacking?

Cloud account hijacking is a serious problem for companies across sectors. 86% of IT leaders said this form of cybercrime cost them more than $500k last year. 

read more
SSPM vs cloud DLP

Top cloud data security risks for managed service providers (MSPs)

The cloud and SaaS present a new frontier for risk. SaaS DLP will make all the difference in controlling this risk and avoiding issues

read more
MSP shadow IT

MSPs: How to help your clients get a handle on shadow IT

IT departments have long struggled with trying to get a handle on shadow IT. How can MSPs and MSSPs help their customers with shadow IT?

read more

What is cloud security?

Cloud security is all about using solutions, processes and security controls to keep cloud environments secure from data loss or exposure

read more
PCI compliance

PCI Compliance: getting started with data discovery

Handle credit cards? Discover how to meet PCI Compliance in the cloud with innovative data discovery solutions for SaaS applications.

read more
what is PCI compliance

What is PCI compliance?

At its core, PCI compliance is all about safeguarding critical information: cardholder data and preventing its exposure.  

read more
Verizon DBIR 2022

Verizon’s 2022 data breach report: TL;DR version

TL;DR the Verizon Data Breach Investigation Report (DBIR) 2022 – 82% of breaches include Human Error. Train & Enforce Policy for your team.

read more

Get Polymer blog posts delivered to your inbox.