Go back

Risky Biz Podcast: Why M365 and Google Workspace are a security liability

In this Risky Business interview, Patrick Gray talks to Material Security’s CEO and co-founder Abhishek Agrawal about the security problems inherent to modern productivity suites.

Industry Insights
November 16, 2023
m read
m read
m listen
m watch
m watch
one headshot of one person in a purple background
speakers
speakers
speakers
authors
Abhishek Agrawal
Abhishek Agrawal
Material Team
participants
Abhishek Agrawal
Abhishek Agrawal
Abhishek Agrawal
share

In this Risky Business interview, Patrick Gray talks to Material Security’s CEO and co-founder Abhishek Agrawal about the security problems inherent to modern productivity suites.

Does it make sense that threat actors can authenticate to o365 and Workspace accounts and clean them out entirely? Years of mail, years of files?

Material Security has built a product that tackles this issue. It can lock up email archives behind MFA challenges, redact PII from inboxes, better control files share via Google Drive and OneDrive, and just generally limit the damage a threat actor can inflict when they compromise a cloud productivity account.

Listen now on the Risky Business website.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

Rajan Kapoor, VP, Security
3
m read
Read post
Podcast

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Listen to episode
Video

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m watch
Watch video
Downloads

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Watch video
Webinar

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Listen episode
blog post

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

Nate Abbott
5
m read
Read post
Podcast

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Listen to episode
Video

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m watch
Watch video
Downloads

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Watch video
Webinar

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Listen episode
blog post

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

Abhishek Agrawal
3
m read
Read post
Podcast

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Listen to episode
Video

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m watch
Watch video
Downloads

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Watch video
Webinar

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Listen episode
blog post

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

Nate Abbott
4
m read
Read post
Podcast

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Listen to episode
Video

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m watch
Watch video
Downloads

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Watch video
Webinar

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.