All Posts

Risky Biz: Why Security should use modern data platforms with Snowflake’s Omer Singer
On the latest Risky Business episode (starts at 42:23), Snowflake's Head of Cybersecurity Strategy, Omer Singer, and Material CEO, Ryan Noon, join Patrick Gray to discuss the evolution of data warehousing and how to adapt cutting-edge data infrastructure to cybersecurity.

Phishing Incident Response: Automate your abuse mailbox and cut triage and response time
Even with huge investments in user training and phishing report triage, attackers still prevail at using email as an easy entry point into an organization. It’s a never-ending battle to secure the inbox.

Material + Snowflake
Today I’m excited to announce a strategic partnership between Material and Snowflake, and as part of that partnership Snowflake has invested in Material. In this post I’m going to explain the rationale behind this partnership and in future posts we’ll cover in detail the integration of both platforms. I’ll also analyze important technological trends that stand to benefit every security and IT team over the next decade.

Protecting data at rest: A guide for security teams
Data loss prevention is a monumental task, and today’s outdated tools make it worse. We’ve written before about the limits of the “outside-in” approach to email security. (See our post: Email is too important to protect like a TSA checkpoint). Unfortunately, that analogy extends to most DLP solutions. They offer the equivalent of a TSA checkpoint as if it was part of a well-defined, “impenetrable” perimeter.

“We all need to communicate better.” — a conversation with CISO Olivia Rose
Twenty one years of security experience means Olivia Rose has a strong take on a range of topics. Chatting to Material CEO Ryan Noon, Olivia pulls no punches as she discusses her own journey to CISO, asks vendors to focus more on building trust, and pushes hiring managers to give underrepresented minorities a chance.

Risky Biz Podcast: Automating Phishing Workflows with Compass' CISO JJ Agha and Ryan Noon
When it comes to phishing incident response, Compass' security team is laser-focused on reducing mean time to remediation. Compass' CISO, JJ Agha, joins Ryan Noon on the Risky Business podcast (starts at 50:01) with host Patrick Gray to share how his team is using Material Security to make phishing workflows not such a pain in the a**.

Identify Google Groups vulnerable to spam and spoofing
One often overlooked element when considering the security posture of an organization's email configuration is the surface area exposed by externally accessible mailing lists. Organizations often set up mailing lists (Google Groups in Google Workspace or Distribution Lists in Microsoft 365) to expose contact points for security, support, invoices, etc to third-party organizations and individuals.
Webinars
Video Library
Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.