ICYMI: Check out CEO Ryan Noon on the The Next Wave Podcast. His recent conversation with hosts Brad Kirby and Laura Roman, PhD, covered topics including the fallout from the recent Colonial Pipeline ransomware attack, security implications tied to email’s use as the key to other business and personal accounts, and where the near future of email security needs to go in order to save the world’s email from hacks like SolarWinds, Hafnium, etc.
The Next Wave Podcast: Ryan Noon
ICYMI: Check out CEO Ryan Noon on the The Next Wave Podcast. His recent conversation with hosts Brad Kirby and Laura Roman, PhD, covered topics including the fallout from the recent Colonial Pipeline ransomware attack, security implications tied to email’s use as the key to other business and personal accounts, and where the near future of email security needs to go in order to save the world’s email from hacks like SolarWinds, Hafnium, etc.
![one headshot of one person in a green background](https://cdn.prod.website-files.com/66831c9bc92b527f4f134122/669978d9f236cd23fab3fd6b_The%20Next%20Wave%20Podcast_%20Ryan%20Noon.avif)
![](https://cdn.prod.website-files.com/66831c9bc92b527f4f134122/669978d9f236cd23fab3fd6b_The%20Next%20Wave%20Podcast_%20Ryan%20Noon.avif)
Related posts
Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.
![Exploring Sensitive Data Trends: What We’ve Learned from Protecting Email and Files Thumbnail](https://cdn.prod.website-files.com/66831c9bc92b527f4f134122/678aad41740770cffecb85f6_11-24-drive-data-thumb%20(1).png)
Exploring Sensitive Data Trends: What We’ve Learned from Protecting Email and Files
Data sprawl is real–and necessary. Email and file-sharing platforms are critical to our day-to-day work. But the amount and type of sensitive information we create and share on a daily basis may surprise you–and demands attention.
![Exploring Sensitive Data Trends: What We’ve Learned from Protecting Email and Files Thumbnail](https://cdn.prod.website-files.com/66831c9bc92b527f4f134122/678aad41740770cffecb85f6_11-24-drive-data-thumb%20(1).png)
Exploring Sensitive Data Trends: What We’ve Learned from Protecting Email and Files
Data sprawl is real–and necessary. Email and file-sharing platforms are critical to our day-to-day work. But the amount and type of sensitive information we create and share on a daily basis may surprise you–and demands attention.
![Exploring Sensitive Data Trends: What We’ve Learned from Protecting Email and Files Thumbnail](https://cdn.prod.website-files.com/66831c9bc92b527f4f134122/678aad41740770cffecb85f6_11-24-drive-data-thumb%20(1).png)
Exploring Sensitive Data Trends: What We’ve Learned from Protecting Email and Files
Data sprawl is real–and necessary. Email and file-sharing platforms are critical to our day-to-day work. But the amount and type of sensitive information we create and share on a daily basis may surprise you–and demands attention.
![Exploring Sensitive Data Trends: What We’ve Learned from Protecting Email and Files Thumbnail](https://cdn.prod.website-files.com/66831c9bc92b527f4f134122/678aad41740770cffecb85f6_11-24-drive-data-thumb%20(1).png)
Exploring Sensitive Data Trends: What We’ve Learned from Protecting Email and Files
Data sprawl is real–and necessary. Email and file-sharing platforms are critical to our day-to-day work. But the amount and type of sensitive information we create and share on a daily basis may surprise you–and demands attention.
Classifying Chaos: How Material Automates User-Reported Phishing at Scale
While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.
Classifying Chaos: How Material Automates User-Reported Phishing at Scale
While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.
Classifying Chaos: How Material Automates User-Reported Phishing at Scale
While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.
Classifying Chaos: How Material Automates User-Reported Phishing at Scale
While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.
Classifying Chaos: How Material Automates User-Reported Phishing at Scale
While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.
Protecting Patients’ Data Beyond HIPAA Requirements
Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.
Protecting Patients’ Data Beyond HIPAA Requirements
Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.
Protecting Patients’ Data Beyond HIPAA Requirements
Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.
Protecting Patients’ Data Beyond HIPAA Requirements
Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.
Protecting Patients’ Data Beyond HIPAA Requirements
Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.
New in Material: Unified Detections and Automated Responses
Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.
New in Material: Unified Detections and Automated Responses
Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.
New in Material: Unified Detections and Automated Responses
Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.
New in Material: Unified Detections and Automated Responses
Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.
New in Material: Unified Detections and Automated Responses
Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.
New in Material: Detections, Remediations, Reports & More
As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.
New in Material: Detections, Remediations, Reports & More
As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.
New in Material: Detections, Remediations, Reports & More
As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.
New in Material: Detections, Remediations, Reports & More
As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.
New in Material: Detections, Remediations, Reports & More
As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.