Product design thumbnail

Designing a Clearer, Faster, More Connected Material

Laying the groundwork for a more powerful, customizable, and trustworthy Material

Laura Gallisa
7m listen
7m read
7m watch
7m watch

All Posts

This is some text inside of a div block.
Clear all
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
rectangles in a yellow background
Blog Post

Reimagining Access Management: Part 1

Here's a non-controversial take: access management is hard. You want to provide people with just enough access to do their jobs, but no more and no less. By granting them too much access, you put your resources at risk. Over-provisioned access is a common misconfiguration which can give attackers the ability to do more damage. Limiting access is an important way to limit the blast radius of an account compromise, which is why least privilege is one of the core pillars of information security. On the other hand, with too little access, your users can’t get their work done.

Joe Portner
10
m watch
m watch
m listen
m read
m read
Engineering
circles in a purple background
Blog Post

How a Trust-Based Culture Supports Parents

Balancing parenthood and work is no small feat. We chatted with some parents here at Material Security to learn about the trials and triumphs of this journey. They've got stories, advice, and a dash of humor to share. We're hoping their stories can make the whole juggling act feel a little less overwhelming for our fellow parents out there.

Material Team
9
m watch
m watch
m listen
m read
m read
People
circles in a blue background
Blog Post

Getting Sensitive Workflows Out of Email

As we’ve previously written about, adding Microsoft 365 and Google Workspace data into a security data lake can unlock many new use cases for security teams. This post continues our series on sharing examples on how to use this data to measure and improve your security posture.

Max Pollard
8
m watch
m watch
m listen
m read
m read
Partners
one headshot of one person in a red background
Podcast

Risky Biz Podcast: A look at running a modern phishing workflow

In this Risky Business News interview, Tom Uren asks Material Security’s Director of Security Chris Long about what it takes to run a “modern” phishing workflow. Chris thinks there are opportunities to take advantage of “phishing superusers”, employees who are a cut above when it comes to uncovering phishing and other malicious activities. Phishing is also the “point of the spear” for defenders — it provides an entry point into attacker activities that enable all sorts of potential detection opportunities.

Material Team
m watch
m watch
m listen
m read
m read
Industry Insights
a group of people in a photo with a solid background
Blog Post

Material Security at Black Hat 2023

We’re headed to Las Vegas for another year of security summer camp. Here’s an overview of where you can find the Material Security team and what we have going on throughout the week of Black Hat 2023.

Material Team
4
m watch
m watch
m listen
m read
m read
People
circles in a red background
Blog Post

Securing Mailboxes in the Era of Persistent Threats: Insights from Recent Chinese State-Linked Hacks

Stating the obvious: Recent events reinforce the fact that the mailboxes inside of organizations continue to be a target and that even strong authentication controls are insufficient to prevent unauthorized access.

Chris Long
4
m watch
m watch
m listen
m read
m read
Industry Insights
two headshots of two people in a green background
Podcast

Risky Biz Podcast: Building an Insider Threat Program with Coinbase' Courtney Healey and Material's Matt Muller

Senior Manager of Insider Threat at Coinbase, Courtney Healey, joins Material's Matt Muller on the Risky Biz podcast (starts at 43:37). They chat with host Patrick Gray on the importance of building a diverse and multi-disciplinary insider threat team and key steps to building a strong insider threat program.

Patrick Gray
Material Team
m watch
m watch
m listen
m read
m read
Industry Insights
lines in a purple background
Blog Post

How to Monitor Shadow IT using Material Security and Snowflake

We recently announced our partnership and integration with Snowflake to give joint customers a seamless way to leverage Microsoft 365 and Google Workspace data in their security data lake. Over the next few months, we’ll be sharing examples on how to use this data to measure and improve your security posture.

Max Pollard
7
m watch
m watch
m listen
m read
m read
Partners
mars plus material plus okta in a blue background
Video

How Mars leveraged identity to protect sensitive content and applications

Maintaining the security of a large digital infrastructure can be a daunting task, especially for global enterprise organizations like Mars. We sat down with several of Mars' security staff to learn how they're leveraging identity to protect sensitive content and applications.

Material Team
8
m watch
m watch
m listen
m read
m read
Industry Insights
No results found.
Please try different keywords.

Whitepapers & Research

Dive into our extensive library of whitepapers to gain in-depth insights and comprehensive analysis on the latest trends and technologies. Explore expert research and stay informed with valuable knowledge to drive your projects forward.

download

Material: Security and Architecture Overview

m read
Get your copy

Video Library

Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.

TLDR Sec Demo Video Deep Dive with Clint Gibler
play button
video

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

45
m watch
Demo Video: Automated File Detection & Response for Google Drive thumbnail
play button
video

Demo Video: Automated File Detection & Response for Google Drive

Take a deeper look at Material's automated detection and response features for Google Drive.

Nate Abbott
2
m watch
Fed Gov Today Interview: Adopting the Zero Trust Mindset Thumbnail
play button
video

Fed Gov Today Interview: Adopting the Zero Trust Mindset

Abhishek joined the Fed Gov Today show with Francis Rose to explore how Federal agencies are utilizing a zero trust approach to build a resilience framework.

Material Team
5
m watch
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.