We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.
There’s a moment in every breach when everything looks normal. No alarms. No blinking red lights. Just silence.
But somewhere, an adversary is reading your CEO’s inbox. They’re not detonating malware or brute-forcing firewalls. They’re scrolling. Learning. Waiting. And they didn’t need to break in to do it. They signed in.
For years, that silence has been the soundtrack of modern intrusion. And I’ve spent most of my career listening to it.
What I Learned Standing Next to the Best Defenders
At Expel, I had the privilege of working alongside some of the most talented SOC and D&R engineers in the world, people who could take an alert and turn it into an investigation in minutes. I watched them fight complex intrusions with precision and empathy. But I also watched them struggle. Not because they weren’t good, but because the battlefield was shifting under their feet.
The attacks weren’t coming through endpoints anymore. They were coming through inboxes, OAuth consents, and collaboration links. Every new productivity tool was another doorway and the keys were identity tokens, not exploits.
When I joined Material, it was because I saw a team ready to fight that next war, the one where the inbox is the new endpoint and identity is the new perimeter.
APT-29 Is the Adversary of Our Time
APT-29 doesn’t smash through firewalls or drop ransomware payloads. They embed themselves inside your trusted systems and operate under the radar of traditional defenses. They weaponize consent, abuse legitimate APIs, and live comfortably inside SaaS ecosystems we all rely on.
They are methodical, patient, and devastatingly effective. It’s not because they’re superhuman, but because our defenses still live in silos, protecting against yesterday’s threats.
We keep deploying tools that detect symptoms instead of campaigns. Email systems flag a message. EDR looks at a device. Network monitors traffic. And while everyone’s watching their own screen, APT-29 is already three steps ahead, using your infrastructure as their weapon.
That’s not just a technical failure. It’s a philosophical one.
Defending Where They Attack
Material was built to end this. We don’t just detect. We see the campaign, the whole thing, from inbox to identity to data.
We treat phishing as the start of the story, not the end. We link that first message to every downstream action: the login from a new ASN, the risky OAuth grant, the quiet Drive share, the configuration tweak that gives an adversary persistence.
When those things happen, Material doesn’t wait for a human to piece it together.
We can roll back the OAuth grant, freeze the share, revoke the token, snapshot the evidence, and push everything back to your SIEM so you can see exactly how the campaign unfolded.
The goal isn’t to drown analysts in alerts; it’s to give them a timeline, a story, a handle on reality. That’s how you win. Not by adding another console, but by automating the responses and remediations that make sense, and making context visible and easily accessible to analysts when deeper investigation is needed.
From Silence to Signal
APT-29 (and groups like them) thrive on invisibility. They win when your systems don’t talk to each other, when your defenses live in different worlds.
So we built Material to make that silence impossible. When the inbox, the identity provider, and the collaboration layer all feed one another, you stop fighting symptoms and can actually stop the campaigns.
And here’s the truth: this isn’t just about nation-states. The same tradecraft is showing up in insider threats, ransomware affiliates, and financially motivated groups. If we can neutralize APT-29, we can stop all of them.
The Future Belongs to Defenders
I’ve never been a SOC analyst. But I stood next to them. I’ve seen what world-class defenders can do when they have the right visibility and the right tools. They don’t want dashboards. They want understanding. They want control. And they need technology that’s as capable as the people attacking them.
That’s what we’re building at Material. We’re working to give them the visibility and control to detect and respond to threats instantly. We’re building to detect attacks, minimize risk, stop threats, and to prevent attackers from stealing the one thing that can never be recovered: time.
Because when the next APT-29 campaign lands in an inbox, it shouldn’t be the start of a breach. It should be the end of one.
We’re done letting attackers weaponize trust. We’re done letting silence hide compromise. And we’re done accepting that “cloud compromise” is inevitable. Material exists to make it unthinkable.
They don’t break in anymore. They sign in. And we’re here to sign them out.
.png)
.png)