WEBINARSecure your AI agents in days, not weeks– Discover Polymer’s SecureRAG today!

Request a demo

Polymer

Download free DLP for AI whitepaper

  • Reset
insider threat

Human risk management: the key to mitigating account takeover attacks

Account takeover (ATO) attacks are rising year after year, despite organizations investing heavily in multi-factor authentication. The reason? Cybercriminals’ tactics are evolving—and MFA is no match.  Just take last month’s phishing attack targeting Microsoft ADFS. Hackers sent fake IT emails, tricking employees into logging into a cloned ADFS page. The moment victims entered their credentials […]

read

How to build a human firewall in the cloud

As more organizations embrace cloud applications like Google Workspace and Microsoft 365, the security risks are escalating. In fact, 4 out of 5 companies have fallen victim to a cloud security breach in the last 18 months.  While it’s easy to blame the cloud itself, the reality is more complex: these breaches are not typically […]

read
Generative AI

Generative AI: The ultimate insider threat?

Generative AI tools like ChatGPT and Bard are taking the world by storm—at a rate faster than security teams can keep up. Today, 78% of knowledge workers use third-party GenAI tools. Yet, just a third of organizations say they have defined guidelines on AI usage in place.  As more and more corporate data flows into […]

read
DSPM DLP

Deel vs. Rippling: A corporate espionage scandal unfolds

In the high-stakes world of HR tech, where companies battle to dominate global workforce management, a scandal has erupted that’s straight out of a spy thriller. Rippling, a leading workforce management platform, has accused its rival Deel of orchestrating a corporate espionage plot. The allegations? A mole within Rippling’s ranks stole trade secrets, customer lists, […]

read
Generative AI

The hidden risks of data exfiltration in cloud and AI apps

Data is the engine of modern enterprises, powering everything from sales and marketing to HR, finance, and customer support. But as organizations increasingly rely on cloud applications and AI-driven tools to streamline operations, they’re also exposing themselves to an expanding array of data security risks. Sensitive information—customer records, financial data, intellectual property, and employee PII—flows […]

read

3 things enterprises should consider as they kick off their AI journey

With the average data breach cost expected to reach $5 million in 2025, organizations have every right to be cautious about integrating AI into their operations. New technology brings new security and data privacy risks, after all.  However, AI is not something to be overlooked. It will transform the very fabric of work—in many organizations […]

read
stiiizy

Is the Stiiizy breach a POS issue? Here’s what really happened

US cannabis brand, Stiiizy, is in the spotlight this week for all the wrong reasons, after it submitted a data breach notification to California’s attorney general. The contents of the filing detail a shocking data breach: an organized cybercrime group stole troves of sensitive data from the company in November 2024, getting away with confidential […]

read
data privacy, data protection

Why data breach costs will reach new heights in 2025

In 2024, the average cost of a data breach soared to $4.88 million—a 10% increase over the previous year. This year, analysis indicates we will see the same percentage increase again, teetering over the $5 million mark.  Obviously, this is an insane amount of money—an amount that would put many organizations out of business. So, […]

read
Cloud security

Securing the cloud: DPSM use cases

​​DSPM may be the latest buzzword in cybersecurity, but what does it actually do? How does it protect your data in the cloud? In this post, we’ll break down the key use cases of data security posture management (DSPM) to help you understand how this emerging technology works. Defining data security posture management (DSPM) Data […]

read
data privacy, data protection

The crypto startup’s guide to data security

“Fail forward” might be the mantra amongst crypto startups, but when it comes to data security, mistakes can come with a devastating price tag. Over the past year, the average cost of a data breach surged to $4.8 million per incident, highlighting just how high the stakes are. Sure, making mistakes is part of the […]

read

Human-AI teaming: The cure for overwhelmed SOCs

Burnout among security leaders and professionals is reaching unprecedented levels. As organizations’ digital landscapes become increasingly complex—spanning the cloud, generative AI, and evolving threat tactics—security teams are struggling to keep pace. Many are feeling overwhelmed by the sheer volume and sophistication of cyber threats, and some are even leaving the profession altogether.  The good news […]

read

Get Polymer blog posts delivered to your inbox.