• Reset

How did Slack lead to ‘Grand Theft Auto’ leak?

Gaming fans got an unexpected treat last weekend when in-development gameplay footage of the upcoming Grand Theft Auto (GTA) game was leaked online. No, this wasn’t an attempt by Rockstar Games—the publisher of GTA— to drum up anticipation for the pending launch.  The company was hacked. And badly. The hacker managed to break into an […]

read more

How to set up zero trust for your SaaS tech stack

Data loss has long been a challenge for organizations. Even in the good old days when company data was stored on-premises, worries about data loss kept IT and security leaders up at night.  Today’s waking nightmare, of course, is the threat of data loss through SaaS applications and cloud infrastructure. In this environment, securing data […]

read more
remote work zero trust security

How to secure remote work with zero trust?

The world of work is constantly changing. If you look back at the last 20 years, you’ll realize by just how much. Fax machines, file cabinets and long days in the office are mostly a thing of the past. Now, people work from anywhere, on any device, at any time.  Technology, of course, is the driving force […]

read more
guide to XDR

A beginner’s Guide to XDR: Extended Detection & Response

Definition Features of XDR What Makes XDR Different Advantages Challenges XDR Stats What is XDR? Recent research from Microsoft shows that cyber criminals – and their attacks – are becoming more sophisticated. Online criminals are using techniques that make them harder to detect. Naturally, to fight this complex threat, cyber security solutions also need to […]

read more
endpoint security

What is endpoint security, & why it’s critical in the post-covid era

According to Gartner research, between 30 and 40% of employees will continue to work remotely after the end of the pandemic. It’s clear that distributed work is here to stay. So, it’s time for IT teams to rethink their strategy and build a security stack that is appropriate for the remote world. The first line […]

read more
what is zero trust

What is the principle of zero trust security?

Zero trust security is an IT security model centered around the concept that organizations should verify every person and device attempting to access their systems and data, whether they are inside or outside the network perimeter, before permitting access. In essence, it’s the idea that no digital entity can simply be trusted to be who […]

read more

Subscribe to Polymer blog