Is your sensitive data at risk? Request a free scan to learn more.

Polymer

Download free DLP for AI whitepaper

  • Reset
Dropbox GitHub Data Breach

Decoding Dropbox vulnerabilities: A comprehensive guide

The cloud storage service Dropbox is used by over 17.2 million individuals and organizations worldwide. This SaaS platform makes it easy to store, manage, and collaborate on documents from anywhere, on any device.  However, despite its popularity, Dropbox has a checkered past when it comes to data privacy and security. Here, we’ll look at Dropbox’s […]

read
notion security notion data security is notion secure

Is Notion secure? What you need to know about Notion vulnerabilities

In the eight years since it launched, Notion has become a much-loved collaboration and productivity tool used by enterprises large and small across the globe.  Because it’s intuitive to use, cloud-based and brimming with helpful features, many employees rely on Notion for tasks like note taking, sharing documents, project management and database storage.  But, despite […]

read

Data leak at Home Depot exposes employee details

On Thursday, April 4, an entity identified as IntelBroker disclosed personal data concerning 10,000 Home Depot employees on a dark web hacking forum. Five days following the breach, Home Depot issued a statement shedding light on the incident. Here’s what we know so far.  How did the Home Depot data leak happen?  In a media […]

read
CISOs and Polymer

5 things CISOs achieve with Polymer data security

It’s a difficult time to be a chief information security officer (CISO). Today’s IT estate is vast, complex and opaque—a jumble of on premises systems, unmanaged devices, SaaS applications and generative AI tools. Sensitive data could be anywhere and, as we all know, the cost of that data being leaked, lost or stolen is higher […]

read
Internal Cybersecurity

Active learning: The next frontier of cybersecurity awareness training

Today’s organizations are investing in cybersecurity controls and technologies more than ever before. It’s easy to understand why. Data breaches and compliance fines aren’t just inconveniences in the modern world of business. They’re potential points of failure. A wide scale security incident can completely erode customer trust and the bottom line, putting some organizations out […]

read
zendesk vulnerabilities zendesk security

Navigating Zendesk vulnerabilities: Risks and remediations

In today’s ultra competitive digital landscape, businesses need to ace their customer service offering to attract, win, and retain customers.  In fact, McKinsey research shows that investing in the customer experience (CX) can improve sales revenues by up to 7% and profitability by up to 2% in just one year.  To enhance the CX, many […]

read
Artificial intelligence

3 ways generative AI will impact CISOs in 2024

The role of the chief information security officer (CISO) has evolved tremendously in the last few years. No longer confined to the stereotype as the stern “office of no” guardian, today’s C-suite looks to the CISO as a digital business enabler, especially when it comes to balancing the risks and rewards of generative AI.    However, […]

read
AI Data Leak Risks

How to safeguard against ChatGPT vulnerabilities 

In the year and a half since its launch, generative AI application ChatGPT has become one of the most popular in the world, amassing over 180 million users as of March 2024.  What sets ChatGPT apart is its usability and accuracy. Through a simple prompt interface, the tool can address a diverse range of queries […]

read
Fujitsu data breach

Fujitsu malware hack: What we know so far

This week, Fujitsu, a prominent IT company based in Japan, announced the discovery of malware on its corporate network, which may have been used to gain unauthorized access to personal information belonging to customers or other parties. This incident adds to Fujitsu’s recent controversies, including its involvement in the British Post Office scandal. Here’s what […]

read
google drive leak google drive leaks google drive leaked

A comprehensive guide to Google Drive vulnerabilities

Organizations large and small rely on Google Drive and the Google Workspace ecosystem for a range of collaboration and document-based tasks. The cloud-based platform is highly intuitive to use and accessible from any device with the right login credentials, making it an excellent option for hybrid and remote teams.  However, Google Drive’s usability can also […]

read
Microsoft Teams Data Breach

Unveiling Microsoft Teams vulnerabilities: risks and protections

Microsoft Teams is one of the most popular corporate messaging and file storage software platforms in the world, used by over one million organizations. But, like all software, Microsoft Teams is liable to vulnerabilities that threat actors can exploit.  Just a few months ago, security researchers discovered a bug in Microsoft’s software that allowed them […]

read

Get Polymer blog posts delivered to your inbox.