Go back

Closing the Loop: Automated Remediation and Deeper Context

Material's latest updates automate threat remediation across the cloud workspace—from calendar invites and inboxes to Google Drive—while providing deeper context and transparency into detection logic.

Product
February 26, 2026
6m read
6m read
6m listen
6m watch
6m watch
Closing the Loop: Automated Remediation and Deeper ContextClosing the Loop: Automated Remediation and Deeper Context
speakers
speakers
speakers
authors
Patrick Duffy
participants
No items found.
share

Material's latest updates automate threat remediation across the cloud workspace—from calendar invites and inboxes to Google Drive—while providing deeper context and transparency into detection logic.

In Material’s last update roundup, we looked at recent updates that helped connect the dots across the cloud workspace. For most security practitioners, the "dots" are rarely the problem—it’s the lines between them.

When an incident hits, an analyst’s brain is essentially a high-speed context engine: Who else got this? Did they click? If they clicked, what did they do next? Speed is the goal, but precision is a requirement. 

This month, we’re releasing a set of features designed to continue to narrow the gap between seeing a threat and fixing–not just in the inbox, but across the entire environment. February’s updates continue Material’s focus on not just identifying the threat chain, but automatically breaking it.

Visualizing the "what happened next" in Google Drive

Detecting a compromised account is one thing; understanding the blast radius is another. If an attacker gains access to a Google Workspace account, one of their first stops is almost always the file store.

We’ve introduced a new Anomalous GDrive Activity UI to give analysts an at-a-glance timeline of an incident. Instead of digging through raw logs to see which files were accessed or shared during a specific window, you can now see GDrive actions mapped directly to the incident timing.

This isn't just about saving time during triage. For an analyst, this is a massive decrease in the cognitive load needed to understand the situation. It’s one thing to see file download alerts, being able to see a timeline of what was downloaded, when, and how sensitive it is makes the stress case more bearable.

No black boxes: improved explainability

"Because the AI said so" is rarely an acceptable answer when a frustrated executive asks why an important (if slightly suspicious) email was nuked.

Security practitioners shouldn’t have to babysit their tools–but they should be able to defend them. We’ve updated the analysis attached to phishing issues to provide significantly more detail on the why.

  • Transparent Detection: See the specific indicators—from sender reputation anomalies to suspicious link construction—that triggered the flag.
  • Impact Mapping: Quickly communicate the logic behind a detection to stakeholders or end-users without needing to reverse-engineer a proprietary model.

By showing the work behind the detection, we’re helping teams build trust in their automated systems while giving analysts the technical ammunition they need for complex cases.

Syncing the inbox and the calendar

Email remains the primary delivery vector, but the payload is increasingly moving to other surfaces. We’ve seen a steady rise in phishing attempts that leverage .ics files to plant malicious links or fake meeting details directly onto a user’s calendar.

The problem? Most remediation is inbox-centric. You defang or delete the email, but the calendar event remains—a persistent and implicitly-trusted potential time bomb sitting in the user’s schedule.

Material’s automated calendar remediation closes this loop:

  • Auto-Cleanup: When Material remediates a phishing message, Material’s workflows can now automatically find and delete the associated calendar event.
  • Smart Restore: We know triage isn't always linear. If a message is later marked as safe, Material automatically puts the meeting back on the calendar, saving you from "where did my meeting go?" support tickets.

Mapping the relationship between identity and data

We’ve added new filters to the Issues list, including a Recipients and a revamped Related To filter.

In a modern cloud office, an "incident" is rarely just a single message. It’s a person, a group, or an account being targeted across multiple surfaces. These filters allow you to pivot instantly:

  • Search for a specific recipient and see every related email, file, and account activity.
  • Understand the relationship between a target and the broader organization’s data footprint.

This helps tell the full story of the threat chain. It moves the conversation from "we blocked a link" to "we protected this specific user and their associated data across the workspace."

Protecting across the entire cycle

Security is rarely about a single "gotcha" moment. It’s a game of persistence and administrative hygiene. By automating the cleanup of calendar invites, surfacing file-level activity in the Google Workspace, and peeling back the curtain on our detection logic, we’re trying to give practitioners a few hours of their week back.

More importantly, we’re ensuring that when a threat is identified, it actually stays dead—across every corner of the cloud office.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

Kate Hutchinson
4
m read
Read post
Podcast

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen to episode
Video

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m watch
Watch video
Downloads

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Watch video
Webinar

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen episode
blog post

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

Nate Abbott
6
m read
Read post
Podcast

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Listen to episode
Video

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m watch
Watch video
Downloads

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Watch video
Webinar

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Listen episode
blog post

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen to episode
Video

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m watch
Watch video
Downloads

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Watch video
Webinar

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen episode
blog post

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m listen
Listen to episode
Video

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m watch
Watch video
Downloads

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m listen
Watch video
Webinar

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New