Low-code, no-code AI is the future. Don’t fall behind.

Download whitepaper

Polymer

Download free DLP for AI whitepaper

  • Reset

Coinbase insider data breach: What we know so far

Crypto exchange giant Coinbase has confirmed a significant data breach involving bribed support contractors, compromised customer information, and a $20 million extortion demand. The attack is expected to cost the company up to $400 million in remediation and reimbursements—and it didn’t involve a single line of malware.  Here’s everything we know so far.  How did […]

read

Security training is failing. Here’s what really works.

Companies are pouring more money than ever into training their people to spot and stop cyber threats. But despite the investment, one stubborn issue won’t go away: humans are still behind the vast majority of data breaches. Even with security awareness training becoming the norm, the numbers show they’re having little impact—60% of breaches still […]

read

Overcoming supply chain risk with third-party management

In the past month alone, big names like Hertz, WK Kellogg, and DBS Bank have all reported serious data breaches. But these attacks weren’t the result of flaws in their own systems. Instead, attackers exploited weaknesses in their software supply chains—targeting third-party vendors to get in. This kind of breach is becoming less of an […]

read
insider threat

Human risk management: the key to mitigating account takeover attacks

Account takeover (ATO) attacks are rising year after year, despite organizations investing heavily in multi-factor authentication. The reason? Cybercriminals’ tactics are evolving—and MFA is no match.  Just take last month’s phishing attack targeting Microsoft ADFS. Hackers sent fake IT emails, tricking employees into logging into a cloned ADFS page. The moment victims entered their credentials […]

read

What are the security risks of DeepSeek?

The Chinese firm DeepSeek has officially entered the AI arena. When the company released its latest iteration in January of this year, it reached 16 million downloads in just 18 days—nearly double the 9 million downloads achieved by OpenAI’s ChatGPT at launch. Chances are, DeepSeek is already being used in your workplace, quietly boosting employee […]

read

DSPM vs CSPM: Why data security posture management is the future of cloud protection

As organizations move more operations to the cloud, security teams face a critical question: Is cloud security posture management (CSPM) enough, or do you need data security posture management (DSPM) too? The answer might surprise you. Understanding the difference: CSPM vs DSPM Cloud security posture management (CSPM) focuses on checking cloud infrastructure settings against security […]

read

SaaS security posture management: The missing link in your security strategy

Organizations are embracing SaaS applications at a lightning pace. But while these tools are excellent for driving collaboration and productivity, they also create significant blind spots in your security posture.  With sensitive data flowing freely across platforms like Slack, Google Workspace, and Microsoft 365, traditional security approaches are simply no longer enough to prevent data […]

read

AI adoption and SaaS consolidation: Navigating security challenges in 2025

Today’s businesses are moving fast—AI adoption is skyrocketing, and SaaS apps are multiplying across teams. But with that growth comes a serious challenge: securing a tech stack that’s evolving faster than traditional security solutions can handle.  The perfect storm: AI adoption meets SaaS consolidation As organizations embrace AI to drive innovation and efficiency, they’re simultaneously […]

read
DSPM DLP

Deel vs. Rippling: A corporate espionage scandal unfolds

In the high-stakes world of HR tech, where companies battle to dominate global workforce management, a scandal has erupted that’s straight out of a spy thriller. Rippling, a leading workforce management platform, has accused its rival Deel of orchestrating a corporate espionage plot. The allegations? A mole within Rippling’s ranks stole trade secrets, customer lists, […]

read
Generative AI

The hidden risks of data exfiltration in cloud and AI apps

Data is the engine of modern enterprises, powering everything from sales and marketing to HR, finance, and customer support. But as organizations increasingly rely on cloud applications and AI-driven tools to streamline operations, they’re also exposing themselves to an expanding array of data security risks. Sensitive information—customer records, financial data, intellectual property, and employee PII—flows […]

read

3 things enterprises should consider as they kick off their AI journey

With the average data breach cost expected to reach $5 million in 2025, organizations have every right to be cautious about integrating AI into their operations. New technology brings new security and data privacy risks, after all.  However, AI is not something to be overlooked. It will transform the very fabric of work—in many organizations […]

read

Get Polymer blog posts delivered to your inbox.