WEBINARSecure your AI agents in days, not weeks– Discover Polymer’s SecureRAG today!

Request a demo

Polymer

Download free DLP for AI whitepaper

  • Reset

What is shadow IT?

Lurking in the shadows of every organization, employees are accessing, transferring, and downloading sensitive company information – without the IT team’s oversight. This is shadow IT: the use of technology systems, like applications, devices and cloud services, that are not approved by the IT department.  Picture this: an employee installs Slack, which is not the […]

read
Data Breach

What is a data breach?

In July 2019, the security hotline for Capital One received an anonymous call. According to the tipster, some of the bank’s most sensitive data had been leaked on the web – and they were right.  Within a few days, the FBI was able to trace the breach back to a malicious insider: a software engineer […]

read
Cybersecurity

What is data classification?

Unstructured data in documents, chats & tickets is making up a higher percentage of total data-footprint in organizations. Transactional databases and customer tables might still be the predominant form of system-of-record but generally these are also being fed from and used alongside SaaS platforms. Understanding what data an organization possesses is the first step towards […]

read
Cybersecurity

What is the OSI model?

The Open Systems Interconnection (OSI) model is a concept for standardizing the communication functions of a computing or telecoms system, regardless of the system architecture or technology. It aims to make different communications systems interoperable by enforcing a common communication protocol. The OSI model was the first standard model for network communications, introduced in 1983 […]

read
zendesk vulnerabilities zendesk security

Zendesk: is sensitive data exfiltrating via tickets?

Zendesk offers a lot of tools to help businesses improve the customer experience, including help desk functions, email marketing, live chat and customer engagement tools. As part of this, Zendesk hosts and provides historic trail for a wealth of customer data – some of which is highly confidential, such as credit card information or addresses.  […]

read
SaaS and SSPM DLP

Third-party installed apps: hidden risks inside your SaaS platforms

Installed 3rd Party Apps over SaaS platforms are for enterprise what mobile App Store apps were for consumers in 2009. You think you are getting a free ping pong game without realizing that all your contacts, personal messages and location history is being exfiltrated to external servers! Optimized workflow. Better collaboration. Improved user experience.Increased performance. That’s […]

read
Data Compliance

Two-factor authorizations: no longer an option for any organization

As cybercrime increases amid the COVID-19 chaos, companies are struggling to protect their customers’ data, putting many at risk of becoming victims of credential and identity theft. A password system alone isn’t enough to keep your organization safe from hackers, who have become much more skilled and sophisticated than ever before. Learn more about two-factor […]

read
Cloud security

Cybersecurity Perspectives from a Former FBI Agent

Kevin Kline, a 30+ year veteran of the FBI with a focus on National Security investigations, has dealt with cyber threats globally. He is currently helping organizations negotiate ransomware and develop defensive policies of protecting against insider threats. In this interview, he speaks to us about:

read
CISOs and Polymer

What is CASB, & why it matters

Cloud-hosted products come with data exfiltration risks that are not well understood. This has definitely been heightened by remote teams and haphazard cloud adoption during COVID-19. Today’s IT teams face a multitude of cloud security challenges: managing remote access to applications; preventing data leakage, ensuring users are who they see are; watching for malware and […]

read
Software false positives

The ugly truth about security software: getting buried under too many false positives

False positives are expensive!! According to a Critical Start survey, for every sixty minutes security operations centers (SOCs) run, fifteen minutes are wasted on false positives.   Further, the study reveals that, on average, a typical organization wastes 286 to 486 hours per week on false positives. Image Source What are false positives? False positives are alarming […]

read
Finance

How are security leaders thinking of 2021 budgets

The rapid rate at which security technology is evolving can make it challenging to evaluate and measure the success of security systems. However, you can properly monitor the effectiveness of your security system and strategy by clearly identifying your desired outcomes and aligning them with your budget. Cisco Secure conducted the Security Outcomes Study in 2020 to […]

read

Get Polymer blog posts delivered to your inbox.