All Posts
New in Material: Enhanced Detections, Improved Triage UX, and Added Insight Reports
With email-based attacks on the rise in both volume and sophistication, Material Security continues to innovate in key areas of cloud office security to better protect your critical Microsoft 365 and Google Workspace environments. We’re pleased to showcase new and enhanced capabilities in our Phishing Protection product to accelerate your threat detection & response workflows.
File Access Monitoring with Osquery: Weaponize your entire macOS fleet into a filesystem-based honeypot
Protecting the security and privacy of our customers' data is our top priority at Material Security. We are constantly improving our ability to detect and respond to increasingly sophisticated threats, and in this scenario we saw an opportunity to contribute an incredibly powerful capability to osquery, a widely used open-source security utility. This new capability greatly improves defenders' ability to detect initial access and reconnaissance activity on macOS endpoints, slowing down a potential attacker. With our open source contribution, this capability is now available to all osquery users.
How to Manage Shadow IT in your Cloud Office
Whether remote or in-person, your company works in the cloud. Collaboration tools like Google Workspace and Office 365 have become the de facto cloud office. Keeping the office secure without impacting productivity has always been top of mind for Security and IT teams – in the cloud, it takes a different shape that requires a fresh perspective on protection.
Democratizing Security Signals
In security, we’re constantly trying to make sense of data – in real-time and with high stakes. That means turning data into strong, actionable signals that can be used across silos and platforms. And strong partnerships help make this a reality. In that spirit, we’re pleased to join several security industry leaders as a launch partner for Identity Threat Protection with Okta AI (Identity Threat Protection), further extending our technical integration with Okta by providing our unique Cloud Office security signals into Okta to empower security teams assessing the risk profile of users and sessions.
A Comprehensive Approach to Securing Email
In the last two decades, email has evolved to become much more than a messaging application. Workplace email accounts have become data repositories, de-facto identities for other SaaS applications, and collaboration tools. It’s no longer sufficient to approach email security solely from the perspective of securing data in transit.
Reimagining Access Management: Part 1
Here's a non-controversial take: access management is hard. You want to provide people with just enough access to do their jobs, but no more and no less. By granting them too much access, you put your resources at risk. Over-provisioned access is a common misconfiguration which can give attackers the ability to do more damage. Limiting access is an important way to limit the blast radius of an account compromise, which is why least privilege is one of the core pillars of information security. On the other hand, with too little access, your users can’t get their work done.
How a Trust-Based Culture Supports Parents
Balancing parenthood and work is no small feat. We chatted with some parents here at Material Security to learn about the trials and triumphs of this journey. They've got stories, advice, and a dash of humor to share. We're hoping their stories can make the whole juggling act feel a little less overwhelming for our fellow parents out there.
Webinars
Video Library
Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.
ESG360 Video: Abhishek Agrawal
Listen and watch our CTO Abhishek chat email security with ESG senior analyst, Dave Gruber, for an ESG360 Video. Their conversation ranged from mapping the evolving email threat landscape facing enterprises and individuals, to shining light on the countless ways a hacker can inflict pain after successfully infiltrating an inbox, to exploring how Material takes a novel approach to delivering inside-out security through APIs.