All Posts

Material’s Single-Tenant Model for Enhanced Data Privacy and Customization
Material Security’s unique optional deployment model eliminates many traditional sources of third-party risk by providing full infrastructure transparency and data isolation to our customers. Material customers have the option to deploy in their own Google Cloud Platform (GCP) project that is single-tenant and fully isolated from other customers. This enables a business approach which requires less trust while simultaneously enabling us to fully customize each environment for feature rollout or customer needs.

Silver Linings Playbook: Takeaways From Our SEC AMA.
While there are no security silver bullets, there's often silver linings. Following an engaging AMA on the topic of recent SEC regulations for disclosing cybersecurity incidents deemed material to investor confidence, our panel of experts all agree – there's positive outcomes once you get past the initial fear.

Business Email Compromise or Business Data Compromise?
Tell me if you’ve heard this one before – email attacks are on the rise in volume and sophistication. In this article, I'll make the justification that the typical approach to email threat detection & response is missing a critical element — containment.

New in Material: Enhanced Detections, Improved Triage UX, and Added Insight Reports
With email-based attacks on the rise in both volume and sophistication, Material Security continues to innovate in key areas of cloud office security to better protect your critical Microsoft 365 and Google Workspace environments. We’re pleased to showcase new and enhanced capabilities in our Phishing Protection product to accelerate your threat detection & response workflows.

File Access Monitoring with Osquery: Weaponize your entire macOS fleet into a filesystem-based honeypot
Protecting the security and privacy of our customers' data is our top priority at Material Security. We are constantly improving our ability to detect and respond to increasingly sophisticated threats, and in this scenario we saw an opportunity to contribute an incredibly powerful capability to osquery, a widely used open-source security utility. This new capability greatly improves defenders' ability to detect initial access and reconnaissance activity on macOS endpoints, slowing down a potential attacker. With our open source contribution, this capability is now available to all osquery users.

How to Manage Shadow IT in your Cloud Office
Whether remote or in-person, your company works in the cloud. Collaboration tools like Google Workspace and Office 365 have become the de facto cloud office. Keeping the office secure without impacting productivity has always been top of mind for Security and IT teams – in the cloud, it takes a different shape that requires a fresh perspective on protection.
Webinars
Video Library
Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.