• Reset
zero trust for SaaS

Does Data Loss Prevention (DLP) support zero trust?

In the modern world of work, zero trust security is the holy grail that all organizations aspire to. It’s easy to see why. With a solid framework in place, you can completely eradicate the risk of data breaches and theft.  However, right now, reaching this state of cybersecurity maturity is proving difficult for many. After […]

read more
third party breaches DLP

What is Fourth party data sharing? Could be the silent security risk !

Outsourcing has become the bedrock of business in the digital world. Need marketing support? An app developer? Product packaging? Whatever the task, there’s a third-party out there that can do the work for you.  But did you ever stop and think about your third-parties, third-parties? Just as your business acquires new skills and saves time […]

read more
cyber forensics

How can DLP help in Cyber Forensics?

Courtroom dramas may be fun to watch on TV, but no enterprise legal team actually wants to end up on the stand. And yet, with the rise of cyber-attacks, whistleblower complaints and class-action lawsuits, commercial disputes over data loss and theft are increasingly commonplace.  Your day in court could be round the corner, so it’s […]

read more
healthcare data breaches

Top HIPAA breaches in 2022

Warren Buffet once said: “It’s good to learn from your mistakes. It’s better to learn from other people’s mistakes.”  What’s that got to do with HIPAA? Well, whenever the OCR or FTC dolls out a penalty for a HIPAA violation, they also provide a handy document explaining why they gave out the fine, and how […]

read more
zero trust for SaaS

How to achieve zero trust in Slack?

Zero trust. You know it’s important. You know you want to implement it in your organization. And you know it could make Slack way more secure – especially given the recent Uber breach! But there’s a problem. Moving from concept to reality is proving mighty difficult.  You’re not alone.  96% of security decision-makers state that […]

read more
SaaS data breach

What is the cost of PII on the dark web in 2022?

How much money do you think a cybercriminal needs to steal your identity on the dark web? $1000? $2000? Maybe less; $800?  Actually, the figure is much, much lower. According to recent research, cybercriminals can start purchasing personally identifiable information (PII) for as little as $15. That would buy you a hacked credit card with […]

read more
business cyber insurance

Can you afford Cyber Insurance as a small business in 2023?

If you’re looking to renew your cyber insurance for 2023, you may be shocked to find that next year’s cost is much higher than ever before. According to research, cyber insurance costs increased by an astonishing 102% during the first quarter of 2022. As a result of these steep price increases, analysts predict that the […]

read more

How did Slack lead to ‘Grand Theft Auto’ leak?

Gaming fans got an unexpected treat last weekend when in-development gameplay footage of the upcoming Grand Theft Auto (GTA) game was leaked online. No, this wasn’t an attempt by Rockstar Games—the publisher of GTA— to drum up anticipation for the pending launch.  The company was hacked. And badly. The hacker managed to break into an […]

read more
zero trust for SaaS

How to set up zero trust for your SaaS tech stack

Data loss has long been a challenge for organizations. Even in the good old days when company data was stored on-premises, worries about data loss kept IT and security leaders up at night.  Today’s waking nightmare, of course, is the threat of data loss through SaaS applications and cloud infrastructure. In this environment, securing data […]

read more
remote work zero trust security

How to secure remote work with zero trust?

The world of work is constantly changing. If you look back at the last 20 years, you’ll realize by just how much. Fax machines, file cabinets and long days in the office are mostly a thing of the past. Now, people work from anywhere, on any device, at any time.  Technology, of course, is the driving force […]

read more
guide to XDR

A beginner’s Guide to XDR: Extended Detection & Response

Definition Features of XDR What Makes XDR Different Advantages Challenges XDR Stats What is XDR? Recent research from Microsoft shows that cyber criminals – and their attacks – are becoming more sophisticated. Online criminals are using techniques that make them harder to detect. Naturally, to fight this complex threat, cyber security solutions also need to […]

read more

Get Polymer blog posts delivered to your inbox.