Who doesn’t love Notion? This easy to use project management and collaboration app has taken the corporate world by storm, making it simple and intuitive for employees to share and organize workplace knowledge all in one place. There’s just one problem—and it’s a big one. Data leakage. Here’s what you need to know about […]
Data security news & resources

Polymer DLP for Notion
Notion is a game-changing collaboration tool for enterprise teams, and we’re excited to be part of this journey. We use Notion and have been a fan of the product for years. That’s why we’re thrilled for the opportunity to collaborate with Notion on a product integration. Notion has streamlined our workflows and unlocked new levels […]

How is AI changing the role of the CISO in healthcare?
From drug discovery to enhanced diagnosis to HR processes, the applications for AI across the healthcare ecosystem are almost endless. With these systems relying so heavily on data, it’s natural that the role of the Chief Information Security Officer (CISO) is entering a new era. While two years ago, just 19% of CISOs sat on […]

Data challenges in AI: Lessons from cloud digital transformations
AI is transforming businesses, but it’s important to learn from past digital transformation challenges. MDM is key to AI success, but it’s complex and challenging. AI deployments are vulnerable to data quality issues, sensitive data leakage, and data poisoning. DLP for AI chatbots is a critical last line of defense.

Noisy DLP? Regular expressions are probably to blame
Ask any security professional what their biggest headache is with data loss prevention (DLP) solutions, and you can bet they’ll say: false positives. Erroneous noise, which happens when a policy is triggered by mistake, has become all too common. Plus, every alarm needs to be investigated, meaning these noisy solutions drastically harm productivity in the […]

What are the risks of using AI in the software development life cycle?
Authors: Yasir Ali (Founder, Polymer DLP) & Aaron Bray (Founder, Phylum) Software supply chain is at risk with LLM adoption Developers now have access to powerful generative AI models that assist in writing code, automating mundane tasks, and improving productivity. While this technology holds tremendous promise, it also brings to light a pressing concern—the potential […]

What’s the difference between DSPM & CSPM?
Not too long ago, cloud security posture management (CSPM) seemed like the holy grail of cloud security, promising unparalleled protection in the cloud-first world. However, organizations have come to realize that although CSPM is great at identifying infrastructure vulnerabilities, data breaches are still happening troublingly frequently. As a result, data security posture management (DSPM) has […]

Is your DLP solution ready for generative AI?
It seems that new AI tools are popping up by the day, promising to revolutionize productivity, efficiency and accuracy in the workplace. With so much to gain from AI platforms like ChatGPT, it’s no wonder that adoption has skyrocketed. But, in the rush to unleash the benefits of these novel tools, it’s vital not to […]

3 mistakes law firms make with Slack
In today’s fast-paced legal landscape, Slack has emerged as the go-to collaboration app for law firms worldwide. However, legal personnel often make a few all too common mistakes with this app that expose their companies to compliance gaps and hinder their ability to effectively manage sensitive information. Below, we’ll explore these mistakes in detail, offering […]

What is PCI DSS 4.0 and how does it impact banks’ data workflows?
PCI DSS is getting a long-awaited makeover and banking institutions need to take note. Sure, banks should be in a good stead to meet PCI compliance, given that they already have to contend with a range of strict data privacy regulations and auditing requirements, such as the GBLA, SOX and regular audits from the FDIC […]

Is insurance industry data safe in cloud apps?
In January of this year, the personal data of over 2 million Aflac life insurance and Zurich auto insurance policyholders ended up on the dark web. How? Because hackers used a contractor’s stolen credentials to break into a cloud server used for marketing purposes. The information stolen included policyholder names, ages, genders, insurance data, coverage […]