Listen to our CEO Ryan and CTO Abhishek chat candidly with hosts Jack and Dave on the Security Voices podcast. Their conversation covered topics ranging from “how to not suck as a vendor” to defining “Really Scary Phishing™.” During the interview, Ryan and Abhishek laid out how 2020, a year of change for so much and so many, was a prime year for phishing—with the central vulnerability being: “distracted people reacting to well-timed messages.”
Security Voices Podcast: Ryan Noon and Abhishek Agrawal
Listen to our CEO Ryan and CTO Abhishek chat candidly with hosts Jack and Dave on the Security Voices podcast. Their conversation covered topics ranging from “how to not suck as a vendor” to defining “Really Scary Phishing™.” During the interview, Ryan and Abhishek laid out how 2020, a year of change for so much and so many, was a prime year for phishing—with the central vulnerability being: “distracted people reacting to well-timed messages.”


Frequently Asked Questions
Find answers to common questions and get the details you need.
Related posts
Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.
The Legacy OAuth Detection Model Doesn't Survive AI Agents
Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.
The Legacy OAuth Detection Model Doesn't Survive AI Agents
Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.
The Legacy OAuth Detection Model Doesn't Survive AI Agents
Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.
The Legacy OAuth Detection Model Doesn't Survive AI Agents
Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.
Healthcare's Email Breach Problem Is a Supply Chain Problem
The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.
Healthcare's Email Breach Problem Is a Supply Chain Problem
The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.
Healthcare's Email Breach Problem Is a Supply Chain Problem
The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.
Healthcare's Email Breach Problem Is a Supply Chain Problem
The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.
Healthcare's Email Breach Problem Is a Supply Chain Problem
The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.
We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.
An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.
We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.
An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.
We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.
An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.
We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.
An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.
We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.
An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.
Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action
New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.
Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action
New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.
Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action
New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.
Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action
New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.
Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action
New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.
The Emerging Attack Surface: Your Cloud Workspace
The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.
The Emerging Attack Surface: Your Cloud Workspace
The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.
The Emerging Attack Surface: Your Cloud Workspace
The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.
The Emerging Attack Surface: Your Cloud Workspace
The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.
The Emerging Attack Surface: Your Cloud Workspace
The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.
