The Legacy OAuth Detection Model Doesn't Survive AI Agents

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

Abhishek Agrawal
8m listen
8m read
8m watch
8m watch

All Posts

This is some text inside of a div block.
Clear all
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience
Blog Post

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

James Juran
7
m watch
m watch
m listen
m read
m read
Product
Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.
Blog Post

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

Abhishek Agrawal
7
m watch
m watch
m listen
m read
m read
Industry Insights
Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team
Blog Post

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

Rajan Kapoor, VP, Security
5
m watch
m watch
m listen
m read
m read
Industry Insights
Try Material Free for 7 Days
Blog Post

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

Material Team
3
m watch
m watch
m listen
m read
m read
Product
Healthcare's Email Breach Problem Is a Supply Chain Problem
Blog Post

Healthcare's Email Breach Problem Is a Supply Chain Problem

The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

Material Team
10
m watch
m watch
m listen
m read
m read
Industry Insights
The Legacy OAuth Detection Model Doesn't Survive AI Agents
Blog Post

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

Abhishek Agrawal
8
m watch
m watch
m listen
m read
m read
Industry Insights
We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.
Blog Post

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

Material Team
10
m watch
m watch
m listen
m read
m read
Industry Insights
Closing the Back Door: Introducing Material’s AI Oauth Threat Remediation Agent
Blog Post

Closing the Back Door: Introducing Material’s Oauth Remediation Agent

Material’s new OAuth Remediation Agent shrinks your attack surface by automating the discovery and cleanup of risky third-party apps and AI agents across your cloud workspace.

Abhishek Agrawal
5
m watch
m watch
m listen
m read
m read
Product
Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action
Blog Post

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

Kate Hutchinson
4
m watch
m watch
m listen
m read
m read
Industry Insights
No results found.
Please try different keywords.

Whitepapers & Research

Dive into our extensive library of whitepapers to gain in-depth insights and comprehensive analysis on the latest trends and technologies. Explore expert research and stay informed with valuable knowledge to drive your projects forward.

download

Material Guide to Google Workspace Security

Secure the business without slowing it down. This guide shows first/only security and IT hires exactly how to harden Google Workspace quickly, decide where native controls are enough, and where to augment—so you can ship security wins now. Fill out the form to the right to download now!

Material Security Team
m read
Get your copy
download

Material: Security and Architecture Overview

Explore Material Security's architecture, designed for robust protection of email and cloud data through a zero-trust approach.

m read
Get your copy

Video Library

Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.

TLDR Sec Demo Video Deep Dive with Clint Gibler
play button
video

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

45
m watch
Demo Video: Automated File Detection & Response for Google Drive thumbnail
play button
video

Demo Video: Automated File Detection & Response for Google Drive

Take a deeper look at Material's automated detection and response features for Google Drive.

Nate Abbott
2
m watch
Fed Gov Today Interview: Adopting the Zero Trust Mindset Thumbnail
play button
video

Fed Gov Today Interview: Adopting the Zero Trust Mindset

Abhishek joined the Fed Gov Today show with Francis Rose to explore how Federal agencies are utilizing a zero trust approach to build a resilience framework.

Material Team
5
m watch
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New