Abhishek joins Ashish Rajan from the Cloud Security Podcast to discuss why email breaches still happen. In their conversation, they cover the critical aspects of threat management and posture management across Google Workspace and Microsoft 365. Listen or watch to get a deeper dive into why you need a focused approach towards securing this often-overlooked segment of our digital infrastructure management.
Cloud Security Podcast Interview: Why Do Email Breaches Still Happen?
Abhishek joins Ashish Rajan from the Cloud Security Podcast to discuss why email breaches still happen. In their conversation, they cover the critical aspects of threat management and posture management across Google Workspace and Microsoft 365. Listen or watch to get a deeper dive into why you need a focused approach towards securing this often-overlooked segment of our digital infrastructure management.


Frequently Asked Questions
Find answers to common questions and get the details you need.
Related posts
Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.
Connecting the Dots: Better Context for Faster Triage
Material's January updates simplify security investigations by making search simpler and connecting disparate risks across the cloud workspace for faster triage.
Connecting the Dots: Better Context for Faster Triage
Material's January updates simplify security investigations by making search simpler and connecting disparate risks across the cloud workspace for faster triage.
Connecting the Dots: Better Context for Faster Triage
Material's January updates simplify security investigations by making search simpler and connecting disparate risks across the cloud workspace for faster triage.
Connecting the Dots: Better Context for Faster Triage
Material's January updates simplify security investigations by making search simpler and connecting disparate risks across the cloud workspace for faster triage.
Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026
To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.
Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026
To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.
Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026
To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.
Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026
To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.
Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026
To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.
The Quiet Phish: Stopping Calendar Invitation Attacks
Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.
The Quiet Phish: Stopping Calendar Invitation Attacks
Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.
The Quiet Phish: Stopping Calendar Invitation Attacks
Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.
The Quiet Phish: Stopping Calendar Invitation Attacks
Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.
The Quiet Phish: Stopping Calendar Invitation Attacks
Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.
A Time to Build, a Time to Buy - How to Make a Choice
Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.
A Time to Build, a Time to Buy - How to Make a Choice
Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.
A Time to Build, a Time to Buy - How to Make a Choice
Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.
A Time to Build, a Time to Buy - How to Make a Choice
Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.
A Time to Build, a Time to Buy - How to Make a Choice
Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.
Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence
Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.
Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence
Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.
Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence
Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.
Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence
Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.
Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence
Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.
