All Posts
The Case for Email Security Posture Management (ESPM)
Following an action packed week at the recent Gartner Security & Risk Management Summit, I’m all full of acronym soup – but amidst the growing number of XSPM categories, and a timely seed planted in a conversation, it got me thinking – can we make a valid case for Email Security Posture Management (ESPM)? I’m not a Gartner analyst, nor do I play one on TV, so consider this a thought experiment.
Risky Biz Podcast Interview with Patrick Gray
Abhishek speaks with Patrick Gray from Risky Biz as a feature for this week's podcast. They also discuss how non-phishing resistant MFA is basically dead, how email content is very useful to security programs, and about how the gen AI won’t really change much on the defensive control side.
Smashing Security Podcast Interview with Carole Theriault
Abhishek speaks with Carole Theriault from Smashing Security as a feature for this week's podcast. They discuss the inception of Material Security, why we should treat email as critical infrastructure, and how the content in your email is a target to move laterally across other accounts.
How to Control External Access to Offboarded Users’ Shared Files
Employee offboarding is a task that HR, IT, and Security teams handle today more often than ever before. As worker mobility continues to increase–both in the form of voluntary job changes and what NIST gently terms “unfriendly” terminations–the ability to seamlessly and securely offboard employees is critical, and failing to do so has serious security implications.
Why Unsanctioned Apps Complicate ATO Attacks–And How to Protect Against Them
Account takeover (ATO) attacks are notoriously difficult to detect. The presence of unsanctioned apps and services within an environment exacerbates the problem. Material’s unique approach to email and data security prevents and streamlines the response to these threats.
John Hammond Video: What Secrets Are in Your Email?
John Hammond, the host of a YouTube channel focused on cybersecurity education and ethical hacking, dug into Material Security’s product suite. We’re encouraged to know that security practitioners realize the importance of protecting sensitive data, other SaaS applications, all in either Google Workspace and Microsoft 365.
Material's take on RSA 2024
If you attended RSA this year, you got to experience the conference in full swing! From the airport to the hotels, San Francisco was full to the brim with security folks. As always, the expo floor was a vast sea of booths and badge scanners. Instead of making an appearance inside of the Moscone Center, Material set up shop around the corner. This allowed us to invite people into a relaxed space for a cup of coffee, quick product demos, or 1:1 meetings with our executive team. We spoke with some Material team members that attended RSA to get their take on what was most successful and what insights they gathered from their conversations.
Webinars
Video Library
Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.