Polymer

Download free DLP for AI whitepaper

  • Reset

Overcoming supply chain risk with third-party management

In the past month alone, big names like Hertz, WK Kellogg, and DBS Bank have all reported serious data breaches. But these attacks weren’t the result of flaws in their own systems. Instead, attackers exploited weaknesses in their software supply chains—targeting third-party vendors to get in. This kind of breach is becoming less of an […]

read

What are the security risks of DeepSeek?

The Chinese firm DeepSeek has officially entered the AI arena. When the company released its latest iteration in January of this year, it reached 16 million downloads in just 18 days—nearly double the 9 million downloads achieved by OpenAI’s ChatGPT at launch. Chances are, DeepSeek is already being used in your workplace, quietly boosting employee […]

read
Has Oracle Cloud really been breached?

Oracle Health data breach impacts hospitals across the US

ChatGPT said: Oracle Health is at the center of a major data breach impacting several U.S. hospitals and healthcare organizations. The breach, which originated from compromised legacy servers, has led to the theft of sensitive patient records. The attacker is now using ransomware to extort victims, demanding payments to prevent the stolen data from being […]

read
Has Oracle Cloud really been breached?

Has Oracle Cloud really been breached?

Over the weekend, a hacker reportedly breached Oracle Cloud’s infrastructure, siphoning off six million sensitive authentication records and potentially putting over 140,000 enterprise customers at risk. You’d expect Oracle to be scrambling to reassure its users. Instead, the company has flat-out denied the breach ever happened. In a statement to The Register, Oracle insisted: “There […]

read
Data security for AI

What is AI readiness?

Think of the workplace 30 years ago, before the proliferation of the internet. The way we worked, communicated, and operated was completely different. While internet usage is now a given in every business and household, its adoption required a significant shift in operations, processes, and culture.  Fast forward to today, and AI is poised to […]

read
DSPM DLP

Generative AI security: preparing for 2025

Artificial intelligence is set to be the defining technology of 2025. As AI tools become an integral part of everyday life, both at work and at home, the pressure is mounting for organizations to innovate and adapt—while securing their systems and data. Despite this growing urgency, many companies are still grappling with how to implement […]

read
Phishing Phishing Scams

AI spoofing: What it is and how to spot it

Cloud account hijacking and spear-phishing emails have long been a concern amongst corporate security teams. Even with tools like multi-factor authentication and spam filters, malicious actors often uncover ways to either break into employee cloud accounts and attempt to persuade unwitting users to share sensitive details. Thankfully–up until now–there’s usually been a few tell-tale signs […]

read
SaaS

SaaS security best practices: the ultimate guide

In this guide, we’ll explore the best practices for securing SaaS applications, from understanding key threats and the vendor landscape to building a culture of data protection.  By delving into the nuances of SaaS security, you’ll be better equipped to navigate the complex landscape of cloud-based threats and maintain robust defenses against potential vulnerabilities. What […]

read
SaaS and SSPM DLP

The role of data loss prevention in enterprise risk assessments

Data loss prevention (DLP) technology is often viewed solely through the lens of safeguarding sensitive information from unauthorized access or breaches. However, its role extends far beyond data protection—it plays a pivotal role in identifying and managing broader organizational risks. Here, we’ll look at the crucial role DLP should play in your enterprise risk assessments.  […]

read

HubSpot cybersecurity incident: What to do

HubSpot was in the hot seat this weekend after rumors started circulating that the company suffered a cybersecurity attack. Here’s everything you need to know. What happened? On Friday 28th June, IT publication TechCrunch caught headwinds of a cybersecurity incident at HubSpot. They reached out to the company’s CISO for further details. Here’s what the […]

read
zendesk vulnerabilities zendesk security

Navigating Zendesk vulnerabilities: Risks and remediations

In today’s ultra competitive digital landscape, businesses need to ace their customer service offering to attract, win, and retain customers.  In fact, McKinsey research shows that investing in the customer experience (CX) can improve sales revenues by up to 7% and profitability by up to 2% in just one year.  To enhance the CX, many […]

read

Get Polymer blog posts delivered to your inbox.