Low-code, no-code AI is the future. Don’t fall behind.

Download whitepaper

Polymer

Download free DLP for AI whitepaper

  • Reset

Coinbase insider data breach: What we know so far

Crypto exchange giant Coinbase has confirmed a significant data breach involving bribed support contractors, compromised customer information, and a $20 million extortion demand. The attack is expected to cost the company up to $400 million in remediation and reimbursements—and it didn’t involve a single line of malware.  Here’s everything we know so far.  How did […]

read

Hidden AI vulnerability risks that threaten your business data

AI tools have revolutionized how businesses operate, but they’ve also introduced significant security gaps. These AI vulnerabilities create pathways for sensitive information to leak outside your organization, often without anyone noticing until it’s too late. AI vulnerability in business environments When employees use AI tools to process business data, they create security holes. This type […]

read
Artificial intelligence

Why your business needs an AI firewall: Protecting data in the age of AI

The rapid adoption of AI tools across businesses has opened new doors for productivity and innovation. But these advancements bring significant risks. When employees use AI tools without proper safeguards, sensitive company data can leak into the wrong hands. This is where an AI firewall becomes essential. What exactly is an AI firewall? An AI […]

read

Security training is failing. Here’s what really works.

Companies are pouring more money than ever into training their people to spot and stop cyber threats. But despite the investment, one stubborn issue won’t go away: humans are still behind the vast majority of data breaches. Even with security awareness training becoming the norm, the numbers show they’re having little impact—60% of breaches still […]

read

AI and the new era of credentials theft

Despite what Hollywood might suggest, most data breaches don’t involve elite hackers cracking firewalls with lines of code. In reality, all it often takes is one stolen password. Just look at the Samsung breach last month—hackers used compromised credentials to access the personal data of over 270,000 customers. This kind of incident isn’t rare. In […]

read

Overcoming supply chain risk with third-party management

In the past month alone, big names like Hertz, WK Kellogg, and DBS Bank have all reported serious data breaches. But these attacks weren’t the result of flaws in their own systems. Instead, attackers exploited weaknesses in their software supply chains—targeting third-party vendors to get in. This kind of breach is becoming less of an […]

read

AI readiness: A guide for healthcare organizations

With over 4 billion people currently lacking access to healthcare services and a projected shortage of 11 million health workers by 2030, AI might well be a savior for healthcare organizations in the next several years. From revolutionizing drug delivery to enhancing diagnostic accuracy, AI could significantly enhance both the quality of care and the […]

read
insider threat

Human risk management: the key to mitigating account takeover attacks

Account takeover (ATO) attacks are rising year after year, despite organizations investing heavily in multi-factor authentication. The reason? Cybercriminals’ tactics are evolving—and MFA is no match.  Just take last month’s phishing attack targeting Microsoft ADFS. Hackers sent fake IT emails, tricking employees into logging into a cloned ADFS page. The moment victims entered their credentials […]

read

4chan data breach: What we know so far

4chan has been unreachable since early Tuesday, with users reporting widespread issues and outage monitoring websites lighting up with user complaints. Speculation is spreading fast across rival forums and social platforms about what’s going on. The leading theory? A massive hack. As background, 4chan is a controversial, anonymous message board that’s been online since 2003. […]

read

What are the security risks of DeepSeek?

The Chinese firm DeepSeek has officially entered the AI arena. When the company released its latest iteration in January of this year, it reached 16 million downloads in just 18 days—nearly double the 9 million downloads achieved by OpenAI’s ChatGPT at launch. Chances are, DeepSeek is already being used in your workplace, quietly boosting employee […]

read

How to build a human firewall in the cloud

As more organizations embrace cloud applications like Google Workspace and Microsoft 365, the security risks are escalating. In fact, 4 out of 5 companies have fallen victim to a cloud security breach in the last 18 months.  While it’s easy to blame the cloud itself, the reality is more complex: these breaches are not typically […]

read

Get Polymer blog posts delivered to your inbox.