• Reset
state privacy laws

What does the new era of data privacy laws means for you?

Data privacy advocates rejoice! 2023 is going to be one for the legislative history books, with the enforcement of four new state data privacy laws in the US. Colorado, Connecticut, Utah, and Virginia will all begin enforcing GDPR-style legislation this year, closely following in the footsteps of California – the first ever state to implement […]

read more
third party breaches DLP

What is Fourth party data sharing? Could be the silent security risk !

Outsourcing has become the bedrock of business in the digital world. Need marketing support? An app developer? Product packaging? Whatever the task, there’s a third-party out there that can do the work for you.  But did you ever stop and think about your third-parties, third-parties? Just as your business acquires new skills and saves time […]

read more
cyber forensics

What is shared cybersecurity defense?

Hands up if your organization uses cloud applications like Microsoft 365, Google Workspace, Slack or AWS? If you do, you’re in the majority. It’s estimated that 90% of companies use the cloud. It’s a huge part of the future of work.  But the cloud is complex—especially when it comes to security. This is because it […]

read more
When documents attack

How to avoid holiday cybersecurity scams?

It’s October: the start of fall, the impending holiday season and, of course, cybersecurity awareness month. While you might not initially think thanksgiving, Black Friday and cybersecurity have much in common, there’s actually a lot to know about, especially when it comes to phishing. You see, there’s been a general trend in recent years of […]

read more
Compliance - CPRA and HR data

Is employee & B2B personal data covered under the CPRA?

On August 31st, the California legislative session notably adjourned without the enactment of Assembly Bill 1102. This bill would have extended the exemption for the inclusion of employee and B2B personal data within the California Privacy Rights Act (CPRA). Without the exemption in place, compliance and governance around B2B and HR personal information will become […]

read more
what is NIST framework

What is the NIST privacy framework?

The NIST Privacy Framework is a tool to help organizations identify, manage and mitigate privacy risks to data such as PII and PHI.

read more
software bill of materials

What is a software bill of materials?

A SBOM is an inventory of metadata. It enables developers to track each of the components used to create their customized software.

read more
CMMC compliance

Do you need CMMC compliance? You will soon.

Use a data-centric approach to proactively prevent sensitive data exposure to third parties or vendors in our increasingly connected world.

read more
what is NIST framework

What is NIST framework?

The technology industry is still technically in its infancy. Every year, it seems that innovation hurls forwards in leaps and bounds. At the same time, the cyber security risks that organizations face are constantly evolving too.  Because everything is, well, so new, there’s a lack of standards and rules out there for mitigating cyber risk – […]

read more

Why is email still the biggest source of sensitive data leaks?

Buckle up… It’s time for some hard truths about your company’s security. You might think that you’re doing every right. You train your employees, use anti-virus and anti-malware technologies, and have an email filter solution in place. Unfortunately, that isn’t enough to protect yourself from today’s breaches–and it’s definitely not enough to meet compliance standards […]

read more
sell_cyber_investment

How to sell cybersecurity investments to your executive team?

Despite data breaches hitting the headlines most days, many security professionals struggle to sign off on the budgets they need to protect their organizations.  CISOs and CIOs can sometimes feel like they are speaking another language in the boardroom. Their executives are results-driven, focused on quarterly revenues and fiscal results. To them, security might come […]

read more

Get Polymer blog posts delivered to your inbox.