WEBINARSecure your AI agents in days, not weeks– Discover Polymer’s SecureRAG today!

Request a demo

Polymer

Download free DLP for AI whitepaper

  • Reset

What are the security risks of DeepSeek?

The Chinese firm DeepSeek has officially entered the AI arena. When the company released its latest iteration in January of this year, it reached 16 million downloads in just 18 days—nearly double the 9 million downloads achieved by OpenAI’s ChatGPT at launch. Chances are, DeepSeek is already being used in your workplace, quietly boosting employee […]

read
Has Oracle Cloud really been breached?

Oracle Health data breach impacts hospitals across the US

ChatGPT said: Oracle Health is at the center of a major data breach impacting several U.S. hospitals and healthcare organizations. The breach, which originated from compromised legacy servers, has led to the theft of sensitive patient records. The attacker is now using ransomware to extort victims, demanding payments to prevent the stolen data from being […]

read
Has Oracle Cloud really been breached?

Has Oracle Cloud really been breached?

Over the weekend, a hacker reportedly breached Oracle Cloud’s infrastructure, siphoning off six million sensitive authentication records and potentially putting over 140,000 enterprise customers at risk. You’d expect Oracle to be scrambling to reassure its users. Instead, the company has flat-out denied the breach ever happened. In a statement to The Register, Oracle insisted: “There […]

read
Data security for AI

What is AI readiness?

Think of the workplace 30 years ago, before the proliferation of the internet. The way we worked, communicated, and operated was completely different. While internet usage is now a given in every business and household, its adoption required a significant shift in operations, processes, and culture.  Fast forward to today, and AI is poised to […]

read
DSPM DLP

Generative AI security: preparing for 2025

Artificial intelligence is set to be the defining technology of 2025. As AI tools become an integral part of everyday life, both at work and at home, the pressure is mounting for organizations to innovate and adapt—while securing their systems and data. Despite this growing urgency, many companies are still grappling with how to implement […]

read
Phishing Phishing Scams

AI spoofing: What it is and how to spot it

Cloud account hijacking and spear-phishing emails have long been a concern amongst corporate security teams. Even with tools like multi-factor authentication and spam filters, malicious actors often uncover ways to either break into employee cloud accounts and attempt to persuade unwitting users to share sensitive details. Thankfully–up until now–there’s usually been a few tell-tale signs […]

read
SaaS

SaaS security best practices: the ultimate guide

In this guide, we’ll explore the best practices for securing SaaS applications, from understanding key threats and the vendor landscape to building a culture of data protection.  By delving into the nuances of SaaS security, you’ll be better equipped to navigate the complex landscape of cloud-based threats and maintain robust defenses against potential vulnerabilities. What […]

read
SaaS and SSPM DLP

The role of data loss prevention in enterprise risk assessments

Data loss prevention (DLP) technology is often viewed solely through the lens of safeguarding sensitive information from unauthorized access or breaches. However, its role extends far beyond data protection—it plays a pivotal role in identifying and managing broader organizational risks. Here, we’ll look at the crucial role DLP should play in your enterprise risk assessments.  […]

read

HubSpot cybersecurity incident: What to do

HubSpot was in the hot seat this weekend after rumors started circulating that the company suffered a cybersecurity attack. Here’s everything you need to know. What happened? On Friday 28th June, IT publication TechCrunch caught headwinds of a cybersecurity incident at HubSpot. They reached out to the company’s CISO for further details. Here’s what the […]

read
zendesk vulnerabilities zendesk security

Navigating Zendesk vulnerabilities: Risks and remediations

In today’s ultra competitive digital landscape, businesses need to ace their customer service offering to attract, win, and retain customers.  In fact, McKinsey research shows that investing in the customer experience (CX) can improve sales revenues by up to 7% and profitability by up to 2% in just one year.  To enhance the CX, many […]

read
google drive leak google drive leaks google drive leaked

A comprehensive guide to Google Drive vulnerabilities

Organizations large and small rely on Google Drive and the Google Workspace ecosystem for a range of collaboration and document-based tasks. The cloud-based platform is highly intuitive to use and accessible from any device with the right login credentials, making it an excellent option for hybrid and remote teams.  However, Google Drive’s usability can also […]

read

Get Polymer blog posts delivered to your inbox.