Building Trustworthy ML at Material Security Thumbnail

Building Trustworthy ML at Material Security

Material’s ML models are built with engineering mastery to ensure the integrity of the models, transparency with our customers, and alignment with their business and security goals.

Gian Gonzaga
10m listen
10m read
10m watch
10m watch

All Posts

This is some text inside of a div block.
Clear all
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Building Trustworthy ML at Material Security Thumbnail
Blog Post

Building Trustworthy ML at Material Security

Material’s ML models are built with engineering mastery to ensure the integrity of the models, transparency with our customers, and alignment with their business and security goals.

Gian Gonzaga
10
m watch
m watch
m listen
m read
m read
Product
Are Your Youngest Employees Your Biggest Security Risk? Thumbnail
Blog Post

Are Your Youngest Employees Your Biggest Security Risk?

Research suggests that digital natives are surprisingly more susceptible to online scams than older generations, highlighting a need for updated security strategies.

Nate Abbott
4
m watch
m watch
m listen
m read
m read
Industry Insights
Hack the Planet: A Recap of Material’s Debut Security Theater
Blog Post

Hack the Planet: A Recap of Material’s Debut Security Theater

What do you get when you gather a bunch of security professionals in a theater to watch a classic hacker movie? A really good time.

Rajan Kapoor, VP, Security
3
m watch
m watch
m listen
m read
m read
People
What’s Your Blast Radius? Thumbnail
Blog Post

What’s Your Blast Radius?

Protecting your environment demands a complete understanding of the risks in every account.

Nate Abbott
9
m watch
m watch
m listen
m read
m read
Industry Insights
No Magic Bullets: Filling the Gaps in Native Security Thumbnail
Blog Post

No Magic Bullets: Filling the Gaps in Native Security

The thriving security market is a feature, not a bug.

Nate Abbott
7
m watch
m watch
m listen
m read
m read
Industry Insights
The Mailbox is the New Domain Admin: Reframing Identity Security in the Cloud Workspace Thumbnail
Blog Post

The Mailbox is the New Domain Admin: Reframing Identity Security in the Cloud Workspace

Email remains as much of a target for attackers as its always been–but as the mailbox is acting as a skeleton key to the rest of users’ digital identities, a reframing of traditional identity security strategies is needed.

Nate Abbott
6
m watch
m watch
m listen
m read
m read
Industry Insights
The Supply Chain is the New Watering Hole Thumbnail
Blog Post

The Supply Chain is the New Watering Hole

The Salesloft Drift attack drives home the fact that modern account takeover defenses must expand beyond perimeter security to monitor the entire environment, including interconnected cloud applications for legitimate but abused access.

Rajan Kapoor, VP, Security
7
m watch
m watch
m listen
m read
m read
Industry Insights
More Tools, More Problems Thumbnail
Blog Post

More Tools, More Problems?

Too many security tools generate as much additional work as they do alerts: the best reduce both risk and toil.

Patrick Duffy
4
m watch
m watch
m listen
m read
m read
Industry Insights
The New Economics of Phishing: Why AI-Generated Attacks Demand a Post-Delivery Defense Thumbnail
Blog Post

The New Economics of Phishing: Why AI-Generated Attacks Demand a Comprehensive Defense

Generative AI has enabled attacks that are both sophisticated and high-volume, necessitating a shift from strictly perimeter-based defense to a holistic security strategy focused on preventing attacks while detecting and responding to threats across the cloud office environment.

Nate Abbott
9
m watch
m watch
m listen
m read
m read
Industry Insights
No results found.
Please try different keywords.

Whitepapers & Research

Dive into our extensive library of whitepapers to gain in-depth insights and comprehensive analysis on the latest trends and technologies. Explore expert research and stay informed with valuable knowledge to drive your projects forward.

download

Material: Security and Architecture Overview

m read
Get your copy

Video Library

Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.

TLDR Sec Demo Video Deep Dive with Clint Gibler
play button
video

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

45
m watch
Demo Video: Automated File Detection & Response for Google Drive thumbnail
play button
video

Demo Video: Automated File Detection & Response for Google Drive

Take a deeper look at Material's automated detection and response features for Google Drive.

Nate Abbott
2
m watch
Fed Gov Today Interview: Adopting the Zero Trust Mindset Thumbnail
play button
video

Fed Gov Today Interview: Adopting the Zero Trust Mindset

Abhishek joined the Fed Gov Today show with Francis Rose to explore how Federal agencies are utilizing a zero trust approach to build a resilience framework.

Material Team
5
m watch
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.