Triage at Speed: Easier Investigation and Hands-Off Remediation

Triage at Speed: Easier Investigation and Hands-Off Remediation

Material is delivering faster security triage and hands-off remediation by offering clearer visual context in the Analysis Card and Timeline view, and introducing a new option to automatically close resolved issues.

James Juran
5m listen
5m read
5m watch
5m watch

All Posts

This is some text inside of a div block.
Clear all
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Triage at Speed: Easier Investigation and Hands-Off Remediation
Blog Post

Triage at Speed: Easier Investigation and Hands-Off Remediation

Material is delivering faster security triage and hands-off remediation by offering clearer visual context in the Analysis Card and Timeline view, and introducing a new option to automatically close resolved issues.

James Juran
5
m watch
m watch
m listen
m read
m read
Product
The New Cloud Attack Surface: Is Your Security Stack Ready?
Blog Post

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

Rajan Kapoor, VP, Security
10
m watch
m watch
m listen
m read
m read
Industry Insights
Clarifying Complexity Through Design
Blog Post

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

Nora Donnay
10
m watch
m watch
m listen
m read
m read
Product
Closing the Loop: Automated Remediation and Deeper Context
Blog Post

Closing the Loop: Automated Remediation and Deeper Context

Material's latest updates automate threat remediation across the cloud workspace—from calendar invites and inboxes to Google Drive—while providing deeper context and transparency into detection logic.

Patrick Duffy
6
m watch
m watch
m listen
m read
m read
Product
Hack Week 2026 Recap Thumb
Blog Post

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

Kate Hutchinson
4
m watch
m watch
m listen
m read
m read
People
Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026
Blog Post

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

Nate Abbott
6
m watch
m watch
m listen
m read
m read
Industry Insights
Connecting the Dots: Better Context for Faster Triage
Blog Post

Connecting the Dots: Better Context for Faster Triage

Material's January updates simplify security investigations by making search simpler and connecting disparate risks across the cloud workspace for faster triage.

Patrick Duffy
7
m watch
m watch
m listen
m read
m read
Product
The Customer Success and Engineering Expertise Behind Material's Cloud Workspace Security
Blog Post

The Customer Success and Engineering Expertise Behind Material's Cloud Workspace Security

Material's cloud workspace security platform is supported by a team of engineering practitioners and dedicated customer experience experts, ensuring a true partnership that delivers measurable security outcomes.

Esther Disbot
7
m watch
m watch
m listen
m read
m read
Product
Blog Post

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

Rajan Kapoor, VP, Security
5
m watch
m watch
m listen
m read
m read
Industry Insights
No results found.
Please try different keywords.

Whitepapers & Research

Dive into our extensive library of whitepapers to gain in-depth insights and comprehensive analysis on the latest trends and technologies. Explore expert research and stay informed with valuable knowledge to drive your projects forward.

download

Material Guide to Google Workspace Security

Secure the business without slowing it down. This guide shows first/only security and IT hires exactly how to harden Google Workspace quickly, decide where native controls are enough, and where to augment—so you can ship security wins now. Fill out the form to the right to download now!

Material Security Team
m read
Get your copy
download

Material: Security and Architecture Overview

Explore Material Security's architecture, designed for robust protection of email and cloud data through a zero-trust approach.

m read
Get your copy

Video Library

Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.

TLDR Sec Demo Video Deep Dive with Clint Gibler
play button
video

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

45
m watch
Demo Video: Automated File Detection & Response for Google Drive thumbnail
play button
video

Demo Video: Automated File Detection & Response for Google Drive

Take a deeper look at Material's automated detection and response features for Google Drive.

Nate Abbott
2
m watch
Fed Gov Today Interview: Adopting the Zero Trust Mindset Thumbnail
play button
video

Fed Gov Today Interview: Adopting the Zero Trust Mindset

Abhishek joined the Fed Gov Today show with Francis Rose to explore how Federal agencies are utilizing a zero trust approach to build a resilience framework.

Material Team
5
m watch
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New