Low-code, no-code AI is the future. Don’t fall behind.

Download whitepaper

Polymer

Download free DLP for AI whitepaper

  • Reset

Runtime data security vs DSPM

In the alphabet soup of cloud security tools, few acronyms have risen faster—or with more promise—than data security posture management (DSPM). Touted as a cure-all for sensitive data exposure, DSPM promises deep visibility into cloud environments.  But as many CISOs have found, visibility alone isn’t enough. DSPM might show you where the problems are—but it […]

read
customer service data leak

Is your customer service team a data leak waiting to happen?

On May 15, the crypto giant, Coinbase, announced that malicious actors had gotten away with the personal information of tens of thousands of customers—an incident set to cost the company nearly $400 million.  But the scale of this breach isn’t the major story. It’s how the cybercriminals did it—bribing outsourced customer service agents to steal […]

read

Texas Department of Transportation breach shows passwords aren’t enough

The Texas Department of Transportation (TxDOT) has disclosed a data breach after a threat actor accessed and downloaded 300,000 crash records from its database. The breach took place on May 12, 2025, and stemmed from a login using compromised credentials—yet another example of how a single weak link in identity security can put huge amounts […]

read

Coinbase insider data breach: What we know so far

Crypto exchange giant Coinbase has confirmed a significant data breach involving bribed support contractors, compromised customer information, and a $20 million extortion demand. The attack is expected to cost the company up to $400 million in remediation and reimbursements—and it didn’t involve a single line of malware.  Here’s everything we know so far.  How did […]

read

Security training is failing. Here’s what really works.

Companies are pouring more money than ever into training their people to spot and stop cyber threats. But despite the investment, one stubborn issue won’t go away: humans are still behind the vast majority of data breaches. Even with security awareness training becoming the norm, the numbers show they’re having little impact—60% of breaches still […]

read

Overcoming supply chain risk with third-party management

In the past month alone, big names like Hertz, WK Kellogg, and DBS Bank have all reported serious data breaches. But these attacks weren’t the result of flaws in their own systems. Instead, attackers exploited weaknesses in their software supply chains—targeting third-party vendors to get in. This kind of breach is becoming less of an […]

read
insider threat

Human risk management: the key to mitigating account takeover attacks

Account takeover (ATO) attacks are rising year after year, despite organizations investing heavily in multi-factor authentication. The reason? Cybercriminals’ tactics are evolving—and MFA is no match.  Just take last month’s phishing attack targeting Microsoft ADFS. Hackers sent fake IT emails, tricking employees into logging into a cloned ADFS page. The moment victims entered their credentials […]

read

How to build a human firewall in the cloud

As more organizations embrace cloud applications like Google Workspace and Microsoft 365, the security risks are escalating. In fact, 4 out of 5 companies have fallen victim to a cloud security breach in the last 18 months.  While it’s easy to blame the cloud itself, the reality is more complex: these breaches are not typically […]

read
Generative AI

Generative AI: The ultimate insider threat?

Generative AI tools like ChatGPT and Bard are taking the world by storm—at a rate faster than security teams can keep up. Today, 78% of knowledge workers use third-party GenAI tools. Yet, just a third of organizations say they have defined guidelines on AI usage in place.  As more and more corporate data flows into […]

read
DSPM DLP

Deel vs. Rippling: A corporate espionage scandal unfolds

In the high-stakes world of HR tech, where companies battle to dominate global workforce management, a scandal has erupted that’s straight out of a spy thriller. Rippling, a leading workforce management platform, has accused its rival Deel of orchestrating a corporate espionage plot. The allegations? A mole within Rippling’s ranks stole trade secrets, customer lists, […]

read
Generative AI

The hidden risks of data exfiltration in cloud and AI apps

Data is the engine of modern enterprises, powering everything from sales and marketing to HR, finance, and customer support. But as organizations increasingly rely on cloud applications and AI-driven tools to streamline operations, they’re also exposing themselves to an expanding array of data security risks. Sensitive information—customer records, financial data, intellectual property, and employee PII—flows […]

read

Get Polymer blog posts delivered to your inbox.