Listen and watch our CTO Abhishek chat email security with ESG senior analyst, Dave Gruber, for an ESG360 Video. Their conversation ranged from mapping the evolving email threat landscape facing enterprises and individuals, to shining light on the countless ways a hacker can inflict pain after successfully infiltrating an inbox, to exploring how Material takes a novel approach to delivering inside-out security through APIs.
ESG360 Video: Abhishek Agrawal
Listen and watch our CTO Abhishek chat email security with ESG senior analyst, Dave Gruber, for an ESG360 Video. Their conversation ranged from mapping the evolving email threat landscape facing enterprises and individuals, to shining light on the countless ways a hacker can inflict pain after successfully infiltrating an inbox, to exploring how Material takes a novel approach to delivering inside-out security through APIs.


Frequently Asked Questions
Find answers to common questions and get the details you need.
Related posts
Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.
A Sharper Lens on Threats, A Clearer View of Risk: Material's Latest Updates
Material's updates make it even easier for security teams to understand and respond to risks and threats with an overhauled Email Threats Dashboard, a new Account View, and more.
A Sharper Lens on Threats, A Clearer View of Risk: Material's Latest Updates
Material's updates make it even easier for security teams to understand and respond to risks and threats with an overhauled Email Threats Dashboard, a new Account View, and more.
A Sharper Lens on Threats, A Clearer View of Risk: Material's Latest Updates
Material's updates make it even easier for security teams to understand and respond to risks and threats with an overhauled Email Threats Dashboard, a new Account View, and more.
A Sharper Lens on Threats, A Clearer View of Risk: Material's Latest Updates
Material's updates make it even easier for security teams to understand and respond to risks and threats with an overhauled Email Threats Dashboard, a new Account View, and more.
The Quiet Phish: Stopping Calendar Invitation Attacks
Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.
The Quiet Phish: Stopping Calendar Invitation Attacks
Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.
The Quiet Phish: Stopping Calendar Invitation Attacks
Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.
The Quiet Phish: Stopping Calendar Invitation Attacks
Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.
The Quiet Phish: Stopping Calendar Invitation Attacks
Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.
A Time to Build, a Time to Buy - How to Make a Choice
Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.
A Time to Build, a Time to Buy - How to Make a Choice
Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.
A Time to Build, a Time to Buy - How to Make a Choice
Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.
A Time to Build, a Time to Buy - How to Make a Choice
Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.
A Time to Build, a Time to Buy - How to Make a Choice
Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.
Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence
Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.
Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence
Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.
Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence
Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.
Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence
Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.
Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence
Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.
Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools
Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.
Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools
Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.
Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools
Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.
Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools
Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.
Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools
Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.
