.png)
Exploring Sensitive Data Trends: What We’ve Learned from Protecting Email and Files
Data sprawl is real–and necessary. Email and file-sharing platforms are critical to our day-to-day work. But the amount and type of sensitive information we create and share on a daily basis may surprise you–and demands attention.
All Posts

Global Observability in a Single-Tenant Architecture
At Material Security, our unique optional deployment model allows us to uphold rigorous standards for security and reliability by dedicating a separate Google Cloud Platform (GCP) instance for each of our customers. This total isolation of customer data and infrastructure establishes trust with our customers while also granting us the flexibility to customize features and deployment configurations on a per-tenant basis.

Risky Biz Podcast Interview with Patrick Gray
Abhishek speaks with Patrick Gray from Risky Biz as a feature for this week's podcast. They also discuss how non-phishing resistant MFA is basically dead, how email content is very useful to security programs, and about how the gen AI won’t really change much on the defensive control side.

The Case for Email Security Posture Management (ESPM)
Following an action packed week at the recent Gartner Security & Risk Management Summit, I’m all full of acronym soup – but amidst the growing number of XSPM categories, and a timely seed planted in a conversation, it got me thinking – can we make a valid case for Email Security Posture Management (ESPM)? I’m not a Gartner analyst, nor do I play one on TV, so consider this a thought experiment.

Smashing Security Podcast Interview with Carole Theriault
Abhishek speaks with Carole Theriault from Smashing Security as a feature for this week's podcast. They discuss the inception of Material Security, why we should treat email as critical infrastructure, and how the content in your email is a target to move laterally across other accounts.

How to Control External Access to Offboarded Users’ Shared Files
Employee offboarding is a task that HR, IT, and Security teams handle today more often than ever before. As worker mobility continues to increase–both in the form of voluntary job changes and what NIST gently terms “unfriendly” terminations–the ability to seamlessly and securely offboard employees is critical, and failing to do so has serious security implications.

Why Unsanctioned Apps Complicate ATO Attacks–And How to Protect Against Them
Account takeover (ATO) attacks are notoriously difficult to detect. The presence of unsanctioned apps and services within an environment exacerbates the problem. Material’s unique approach to email and data security prevents and streamlines the response to these threats.
Webinars
Video Library
Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.