Polymer

Download free DLP for AI whitepaper

  • Reset
SaaS

Data loss prevention: Best practices

Data loss prevention (DLP) tools have been part of the security stack for over 30 years. When this technology first arrived on the scene, it was considered the holy grail of security. However, in the last 10 years, DLP has fallen out of favor.  It’s known for producing high false positives, barrages of alerts, and […]

read
SaaS

How SaaS is reshaping cybersecurity

SaaS apps like Slack, Microsoft Teams, and Google Workspace are integral to workplace productivity. But they’re also a security headache. According to recent research, most companies have a $28 million data breach risk lurking in their SaaS apps, stemming from issues like unsecured data, compromised credentials, and data loss. To combat these threats, security vendors […]

read
Artificial intelligence

How AI is transforming the SaaS landscape

Over the past decade, software-as-a-service (SaaS) applications have transformed the way we live and work.  From Microsoft Teams and Slack, which revolutionized workplace communication, to the likes of Netflix and Spotify, which completely changed how people consume digital media, the ubiquity of SaaS apps in daily life cannot be understated.  And now, we are entering […]

read

Navigating Slack vulnerabilities: awareness to action

In the last ten years, Slack has soared in popularity as a critical workplace tool. Praised as the cornerstone of employee efficiency, it’s hailed for its speed, ease of use, and instant communication capabilities, enabling teams to bypass the formality and delays often associated with email. However, alongside its productivity and collaboration benefits, organizations must […]

read
Dropbox GitHub Data Breach

Decoding Dropbox vulnerabilities: A comprehensive guide

The cloud storage service Dropbox is used by over 17.2 million individuals and organizations worldwide. This SaaS platform makes it easy to store, manage, and collaborate on documents from anywhere, on any device.  However, despite its popularity, Dropbox has a checkered past when it comes to data privacy and security. Here, we’ll look at Dropbox’s […]

read
notion security notion data security is notion secure

Is Notion secure? What you need to know about Notion vulnerabilities

In the eight years since it launched, Notion has become a much-loved collaboration and productivity tool used by enterprises large and small across the globe.  Because it’s intuitive to use, cloud-based and brimming with helpful features, many employees rely on Notion for tasks like note taking, sharing documents, project management and database storage.  But, despite […]

read
CMMC 2.0

The department of defense presses the accelerator on CMMC 2.0

On December 26, 2023, the department of defense (DoD) announced the proposed rule for CMMC 2.0, which is open for comments until February 26, 2024.   If you’re an organization that works with the DoD, it’s time to start preparing for CMMC 2.0 compliance.  What is the difference between CMMC 1.0 and CMMC 2.0? In 2020, […]

read
Raptor Technologies

Over 4 million sensitive school records exposed in cloud data leak

This week, thousands of schools across the US became embroiled in a mass data leak, after the school safety software company—Raptor Technologies—accidentally left troves of sensitive data exposed on the internet.  What happened with the Raptor Technologies data breach?  On January 11, a cybersecurity researcher unearthed a concerning discovery: an unprotected database housing an estimated […]

read
Cybersecurity training

Need to know: NIST’s upcoming guidance on cybersecurity awareness & training

It’s been 20 years since the National Institute of Standards and Technology (NIST) released its guidance on building enterprise security awareness and training programs. A lot has changed since then.  With new attack types, the advent of cloud applications, the work-from-anywhere era, and generative AI, NIST has realized that their previous idea of effective training […]

read
Shadow IT graphic

Shadow AI: The new shadow IT threat vector

While major corporations such as Apple, Spotify, and Samsung are all placing restrictions on how employees interact with generative AI in the workplace, it appears that many workers are going full steam ahead with AI use. Recent research by Dell, for example, shows that 91% of respondents have used generative AI, and a notable 71% […]

read
Data security controls

Noisy DLP? Regular expressions are probably to blame

Ask any security professional what their biggest headache is with data loss prevention (DLP) solutions, and you can bet they’ll say: false positives. Erroneous noise, which happens when a policy is triggered by mistake, has become all too common. Plus, every alarm needs to be investigated, meaning these noisy solutions drastically harm productivity in the […]

read

Get Polymer blog posts delivered to your inbox.