Download free DLP for AI whitepaper

  • Reset

The role of data loss prevention in enterprise risk assessments

Data loss prevention (DLP) technology is often viewed solely through the lens of safeguarding sensitive information from unauthorized access or breaches. However, its role extends far beyond data protection—it plays a pivotal role in identifying and managing broader organizational risks. Here, we’ll look at the crucial role DLP should play in your enterprise risk assessments.  […]


HubSpot cybersecurity incident: What to do

HubSpot was in the hot seat this weekend after rumors started circulating that the company suffered a cybersecurity attack. Here’s everything you need to know. What happened? On Friday 28th June, IT publication TechCrunch caught headwinds of a cybersecurity incident at HubSpot. They reached out to the company’s CISO for further details. Here’s what the […]

zendesk vulnerabilities zendesk security

Navigating Zendesk vulnerabilities: Risks and remediations

In today’s ultra competitive digital landscape, businesses need to ace their customer service offering to attract, win, and retain customers.  In fact, McKinsey research shows that investing in the customer experience (CX) can improve sales revenues by up to 7% and profitability by up to 2% in just one year.  To enhance the CX, many […]

google drive leak google drive leaks google drive leaked

A comprehensive guide to Google Drive vulnerabilities

Organizations large and small rely on Google Drive and the Google Workspace ecosystem for a range of collaboration and document-based tasks. The cloud-based platform is highly intuitive to use and accessible from any device with the right login credentials, making it an excellent option for hybrid and remote teams.  However, Google Drive’s usability can also […]

Generative AI

Can SASE secure generative AI applications?

According to the analyst firm Forrester, this year is going to be a major one for generative AI (GenAI) data breaches and compliance fines. It’s easy to see why. While the accidental insider threat has long been a leading cause of cybersecurity incidents in the enterprise, the rise of applications like ChatGPT and Bard mean […]

Dollar Tree breach

Millions impacted by Dollar Tree supply chain breach

You might be confident in your cybersecurity posture, but if you don’t know how your suppliers approach data protection, you’re still at risk of a huge data breach.  That’s precisely what happened to Dollar Tree. Over the weekend, the well-known discount retailer hit the headlines after falling victim to a supply chain cyber attack. And, […]

Cloud security

Unlocking generative AI’s potential in the security operations center

These days, the security operations center isn’t a fun place to be. According to research, 84% of security professionals are burned out and overwhelmed by alert fatigue, false alarms, and limited visibility into the technology stack. As a consequence, the cybersecurity skills gap increased by 12% in the last 12 months, with a mass exodus […]

Zero trust security

Generative AI in cybersecurity: A double-edged sword

Generative AI is the perfect embodiment of the double edged sword. Yes, the consensus is clear: tools like Bard and ChatGPT are sparking a surge in productivity in the enterprise, spanning cybersecurity, customer experience, sales and more. It’s a boon on one side of the spectrum. Now, let’s turn our attention to the other side—the […]

Artificial intelligence

2024 predictions: The future of generative AI

2023 was, undoubtedly, generative AI’s breakout year. What began as a niche realm reserved for the tech-savvy elite quickly transformed into a democratic tool accessible to the masses. AI’s ascent has been nothing short of meteoric. But here’s the burning question: What lies beyond the horizon? While AI rattled the foundations of the workplace in […]

Data privacy

Is insurance industry data safe in cloud apps?

In January of this year, the personal data of over 2 million Aflac life insurance and Zurich auto insurance policyholders ended up on the dark web. How? Because hackers used a contractor’s stolen credentials to break into a cloud server used for marketing purposes.  The information stolen included policyholder names, ages, genders, insurance data, coverage […]

Medical Patient Data Leak Security

How to protect patient data against insider threats?

It’s no secret that the healthcare sector is a prime target for cyber-attacks. Research shows healthcare organizations in the US experienced 1,426 attacks per week in 2022 – up 60% from the year before.  But while healthcare companies spend their limited resources and time shielding patient health information (PHI) from external threats, they forget that […]


Get Polymer blog posts delivered to your inbox.