Building the Future of Cloud Workspace Security Thumbnail

New in Material: Building the Future of Cloud Workspace Security

Material protects your entire cloud workspace–the emails, files, and accounts critical to your business–here’s how we’re building it.

John Hrvatin
5m listen
5m read
5m watch
5m watch

All Posts

This is some text inside of a div block.
Clear all
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
circles in a blue background
Blog Post

How to Manage Shadow IT in your Cloud Office

Whether remote or in-person, your company works in the cloud. Collaboration tools like Google Workspace and Office 365 have become the de facto cloud office. Keeping the office secure without impacting productivity has always been top of mind for Security and IT teams – in the cloud, it takes a different shape that requires a fresh perspective on protection.

Tina Jiang
8
m watch
m watch
m listen
m read
m read
Engineering
okta plus material in a solid background
Blog Post

Democratizing Security Signals

In security, we’re constantly trying to make sense of data – in real-time and with high stakes. That means turning data into strong, actionable signals that can be used across silos and platforms. And strong partnerships help make this a reality. In that spirit, we’re pleased to join several security industry leaders as a launch partner for Identity Threat Protection with Okta AI (Identity Threat Protection), further extending our technical integration with Okta by providing our unique Cloud Office security signals into Okta to empower security teams assessing the risk profile of users and sessions.

Matt Muller
4
m watch
m watch
m listen
m read
m read
Engineering
lines creating a rectangle in a green background
Blog Post

A Comprehensive Approach to Securing Email

In the last two decades, email has evolved to become much more than a messaging application. Workplace email accounts have become data repositories, de-facto identities for other SaaS applications, and collaboration tools. It’s no longer sufficient to approach email security solely from the perspective of securing data in transit.

Material Team
10
m watch
m watch
m listen
m read
m read
Product
rectangles in a yellow background
Blog Post

Reimagining Access Management: Part 1

Here's a non-controversial take: access management is hard. You want to provide people with just enough access to do their jobs, but no more and no less. By granting them too much access, you put your resources at risk. Over-provisioned access is a common misconfiguration which can give attackers the ability to do more damage. Limiting access is an important way to limit the blast radius of an account compromise, which is why least privilege is one of the core pillars of information security. On the other hand, with too little access, your users can’t get their work done.

Joe Portner
10
m watch
m watch
m listen
m read
m read
Engineering
circles in a purple background
Blog Post

How a Trust-Based Culture Supports Parents

Balancing parenthood and work is no small feat. We chatted with some parents here at Material Security to learn about the trials and triumphs of this journey. They've got stories, advice, and a dash of humor to share. We're hoping their stories can make the whole juggling act feel a little less overwhelming for our fellow parents out there.

Material Team
9
m watch
m watch
m listen
m read
m read
People
circles in a blue background
Blog Post

Getting Sensitive Workflows Out of Email

As we’ve previously written about, adding Microsoft 365 and Google Workspace data into a security data lake can unlock many new use cases for security teams. This post continues our series on sharing examples on how to use this data to measure and improve your security posture.

Max Pollard
8
m watch
m watch
m listen
m read
m read
Partners
one headshot of one person in a red background
Podcast

Risky Biz Podcast: A look at running a modern phishing workflow

In this Risky Business News interview, Tom Uren asks Material Security’s Director of Security Chris Long about what it takes to run a “modern” phishing workflow. Chris thinks there are opportunities to take advantage of “phishing superusers”, employees who are a cut above when it comes to uncovering phishing and other malicious activities. Phishing is also the “point of the spear” for defenders — it provides an entry point into attacker activities that enable all sorts of potential detection opportunities.

Material Team
m watch
m watch
m listen
m read
m read
Industry Insights
a group of people in a photo with a solid background
Blog Post

Material Security at Black Hat 2023

We’re headed to Las Vegas for another year of security summer camp. Here’s an overview of where you can find the Material Security team and what we have going on throughout the week of Black Hat 2023.

Material Team
4
m watch
m watch
m listen
m read
m read
People
circles in a red background
Blog Post

Securing Mailboxes in the Era of Persistent Threats: Insights from Recent Chinese State-Linked Hacks

Stating the obvious: Recent events reinforce the fact that the mailboxes inside of organizations continue to be a target and that even strong authentication controls are insufficient to prevent unauthorized access.

Chris Long
4
m watch
m watch
m listen
m read
m read
Industry Insights
No results found.
Please try different keywords.

Whitepapers & Research

Dive into our extensive library of whitepapers to gain in-depth insights and comprehensive analysis on the latest trends and technologies. Explore expert research and stay informed with valuable knowledge to drive your projects forward.

download

Material: Security and Architecture Overview

m read
Get your copy

Video Library

Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.

TLDR Sec Demo Video Deep Dive with Clint Gibler
play button
video

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

45
m watch
Demo Video: Automated File Detection & Response for Google Drive thumbnail
play button
video

Demo Video: Automated File Detection & Response for Google Drive

Take a deeper look at Material's automated detection and response features for Google Drive.

Nate Abbott
2
m watch
Fed Gov Today Interview: Adopting the Zero Trust Mindset Thumbnail
play button
video

Fed Gov Today Interview: Adopting the Zero Trust Mindset

Abhishek joined the Fed Gov Today show with Francis Rose to explore how Federal agencies are utilizing a zero trust approach to build a resilience framework.

Material Team
5
m watch
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.