All Posts

Why Unsanctioned Apps Complicate ATO Attacks–And How to Protect Against Them
Account takeover (ATO) attacks are notoriously difficult to detect. The presence of unsanctioned apps and services within an environment exacerbates the problem. Material’s unique approach to email and data security prevents and streamlines the response to these threats.

John Hammond Video: What Secrets Are in Your Email?
John Hammond, the host of a YouTube channel focused on cybersecurity education and ethical hacking, dug into Material Security’s product suite. We’re encouraged to know that security practitioners realize the importance of protecting sensitive data, other SaaS applications, all in either Google Workspace and Microsoft 365.

Material's take on RSA 2024
If you attended RSA this year, you got to experience the conference in full swing! From the airport to the hotels, San Francisco was full to the brim with security folks. As always, the expo floor was a vast sea of booths and badge scanners. Instead of making an appearance inside of the Moscone Center, Material set up shop around the corner. This allowed us to invite people into a relaxed space for a cup of coffee, quick product demos, or 1:1 meetings with our executive team. We spoke with some Material team members that attended RSA to get their take on what was most successful and what insights they gathered from their conversations.

Meet with Material at RSA 2024
This year at RSA 2024, we have an exciting lineup for folks flocking to San Francisco! We know the week can feel extra crazy and overwhelming with over-the-top attention-grabbing efforts and events happening in different spots. That’s why we are hosting an all-in-one space to welcome you and your team to Material’s lounge for a cup of coffee, exclusive executive meetings, and our evening party. We promise we won’t scan your badge, but we will promise some good company and some limited edition swag!

Cloud Security Podcast Interview: Why Do Email Breaches Still Happen?
Abhishek joins Ashish Rajan from the Cloud Security Podcast to discuss why email breaches still happen. In their conversation, they cover the critical aspects of threat management and posture management across Google Workspace and Microsoft 365. Listen or watch to get a deeper dive into why you need a focused approach towards securing this often-overlooked segment of our digital infrastructure management.
Webinars
Video Library
Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.