All Posts
Getting Sensitive Workflows Out of Email
As we’ve previously written about, adding Microsoft 365 and Google Workspace data into a security data lake can unlock many new use cases for security teams. This post continues our series on sharing examples on how to use this data to measure and improve your security posture.
Risky Biz Podcast: A look at running a modern phishing workflow
In this Risky Business News interview, Tom Uren asks Material Security’s Director of Security Chris Long about what it takes to run a “modern” phishing workflow. Chris thinks there are opportunities to take advantage of “phishing superusers”, employees who are a cut above when it comes to uncovering phishing and other malicious activities. Phishing is also the “point of the spear” for defenders — it provides an entry point into attacker activities that enable all sorts of potential detection opportunities.
Securing Mailboxes in the Era of Persistent Threats: Insights from Recent Chinese State-Linked Hacks
Stating the obvious: Recent events reinforce the fact that the mailboxes inside of organizations continue to be a target and that even strong authentication controls are insufficient to prevent unauthorized access.
Risky Biz Podcast: Building an Insider Threat Program with Coinbase' Courtney Healey and Material's Matt Muller
Senior Manager of Insider Threat at Coinbase, Courtney Healey, joins Material's Matt Muller on the Risky Biz podcast (starts at 43:37). They chat with host Patrick Gray on the importance of building a diverse and multi-disciplinary insider threat team and key steps to building a strong insider threat program.
How to Monitor Shadow IT using Material Security and Snowflake
We recently announced our partnership and integration with Snowflake to give joint customers a seamless way to leverage Microsoft 365 and Google Workspace data in their security data lake. Over the next few months, we’ll be sharing examples on how to use this data to measure and improve your security posture.
How Mars leveraged identity to protect sensitive content and applications
Maintaining the security of a large digital infrastructure can be a daunting task, especially for global enterprise organizations like Mars. We sat down with several of Mars' security staff to learn how they're leveraging identity to protect sensitive content and applications.
How Material Security Uncovered a Vulnerability in the Gmail API
Keeping Google and Microsoft account data secure is the foundation of our business at Material Security. When we discovered a serious vulnerability in the Gmail API, we immediately informed Google’s Bug Bounty program.
Webinars
Video Library
Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.
ESG360 Video: Abhishek Agrawal
Listen and watch our CTO Abhishek chat email security with ESG senior analyst, Dave Gruber, for an ESG360 Video. Their conversation ranged from mapping the evolving email threat landscape facing enterprises and individuals, to shining light on the countless ways a hacker can inflict pain after successfully infiltrating an inbox, to exploring how Material takes a novel approach to delivering inside-out security through APIs.