Material Guide to Google Workspace Security
Secure the business without slowing it down. This guide shows first/only security and IT hires exactly how to harden Google Workspace quickly, decide where native controls are enough, and where to augment—so you can ship security wins now. Fill out the form to the right to download now!
All Posts

Getting Sensitive Workflows Out of Email
As we’ve previously written about, adding Microsoft 365 and Google Workspace data into a security data lake can unlock many new use cases for security teams. This post continues our series on sharing examples on how to use this data to measure and improve your security posture.

Risky Biz Podcast: A look at running a modern phishing workflow
In this Risky Business News interview, Tom Uren asks Material Security’s Director of Security Chris Long about what it takes to run a “modern” phishing workflow. Chris thinks there are opportunities to take advantage of “phishing superusers”, employees who are a cut above when it comes to uncovering phishing and other malicious activities. Phishing is also the “point of the spear” for defenders — it provides an entry point into attacker activities that enable all sorts of potential detection opportunities.
Securing Mailboxes in the Era of Persistent Threats: Insights from Recent Chinese State-Linked Hacks
Stating the obvious: Recent events reinforce the fact that the mailboxes inside of organizations continue to be a target and that even strong authentication controls are insufficient to prevent unauthorized access.
Risky Biz Podcast: Building an Insider Threat Program with Coinbase' Courtney Healey and Material's Matt Muller
Senior Manager of Insider Threat at Coinbase, Courtney Healey, joins Material's Matt Muller on the Risky Biz podcast (starts at 43:37). They chat with host Patrick Gray on the importance of building a diverse and multi-disciplinary insider threat team and key steps to building a strong insider threat program.
How to Monitor Shadow IT using Material Security and Snowflake
We recently announced our partnership and integration with Snowflake to give joint customers a seamless way to leverage Microsoft 365 and Google Workspace data in their security data lake. Over the next few months, we’ll be sharing examples on how to use this data to measure and improve your security posture.

How Mars leveraged identity to protect sensitive content and applications
Maintaining the security of a large digital infrastructure can be a daunting task, especially for global enterprise organizations like Mars. We sat down with several of Mars' security staff to learn how they're leveraging identity to protect sensitive content and applications.

How Material Security Uncovered a Vulnerability in the Gmail API
Keeping Google and Microsoft account data secure is the foundation of our business at Material Security. When we discovered a serious vulnerability in the Gmail API, we immediately informed Google’s Bug Bounty program.
Webinars
Video Library
Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.

