Listen and watch our CTO Abhishek chat email security with ESG senior analyst, Dave Gruber, for an ESG360 Video. Their conversation ranged from mapping the evolving email threat landscape facing enterprises and individuals, to shining light on the countless ways a hacker can inflict pain after successfully infiltrating an inbox, to exploring how Material takes a novel approach to delivering inside-out security through APIs.
ESG360 Video: Abhishek Agrawal
Listen and watch our CTO Abhishek chat email security with ESG senior analyst, Dave Gruber, for an ESG360 Video. Their conversation ranged from mapping the evolving email threat landscape facing enterprises and individuals, to shining light on the countless ways a hacker can inflict pain after successfully infiltrating an inbox, to exploring how Material takes a novel approach to delivering inside-out security through APIs.


Frequently Asked Questions
Find answers to common questions and get the details you need.
Related posts
Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.
The Legacy OAuth Detection Model Doesn't Survive AI Agents
Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.
The Legacy OAuth Detection Model Doesn't Survive AI Agents
Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.
The Legacy OAuth Detection Model Doesn't Survive AI Agents
Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.
The Legacy OAuth Detection Model Doesn't Survive AI Agents
Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.
Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest
The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.
Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest
The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.
Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest
The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.
Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest
The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.
Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest
The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.
Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience
Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.
Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience
Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.
Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience
Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.
Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience
Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.
Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience
Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.
Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.
AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.
Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.
AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.
Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.
AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.
Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.
AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.
Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.
AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.
Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team
OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.
Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team
OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.
Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team
OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.
Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team
OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.
Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team
OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.
