Closing the Loop: Automated Remediation and Deeper Context

Closing the Loop: Automated Remediation and Deeper Context

Material's latest updates automate threat remediation across the cloud workspace—from calendar invites and inboxes to Google Drive—while providing deeper context and transparency into detection logic.

Patrick Duffy
6m listen
6m read
6m watch
6m watch

All Posts

This is some text inside of a div block.
Clear all
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
arrows inside a circle in a blue background
Blog Post

What Constitutes Material Impact? The SEC Needs You To Know.

Join us for a live ask me anything (AMA) session on January 25th around this topic. RSVP and submit your questions here.

Ivan Dwyer
5
m watch
m watch
m listen
m read
m read
Industry Insights
circles and arrows in a red background
Blog Post

File Access Monitoring with Osquery: Weaponize your entire macOS fleet into a filesystem-based honeypot

Protecting the security and privacy of our customers' data is our top priority at Material Security. We are constantly improving our ability to detect and respond to increasingly sophisticated threats, and in this scenario we saw an opportunity to contribute an incredibly powerful capability to osquery, a widely used open-source security utility. This new capability greatly improves defenders' ability to detect initial access and reconnaissance activity on macOS endpoints, slowing down a potential attacker. With our open source contribution, this capability is now available to all osquery users.

Chris Long
7
m watch
m watch
m listen
m read
m read
Engineering
circles in a blue background
Blog Post

How to Manage Shadow IT in your Cloud Office

Whether remote or in-person, your company works in the cloud. Collaboration tools like Google Workspace and Office 365 have become the de facto cloud office. Keeping the office secure without impacting productivity has always been top of mind for Security and IT teams – in the cloud, it takes a different shape that requires a fresh perspective on protection.

Tina Jiang
8
m watch
m watch
m listen
m read
m read
Engineering
okta plus material in a solid background
Blog Post

Democratizing Security Signals

In security, we’re constantly trying to make sense of data – in real-time and with high stakes. That means turning data into strong, actionable signals that can be used across silos and platforms. And strong partnerships help make this a reality. In that spirit, we’re pleased to join several security industry leaders as a launch partner for Identity Threat Protection with Okta AI (Identity Threat Protection), further extending our technical integration with Okta by providing our unique Cloud Office security signals into Okta to empower security teams assessing the risk profile of users and sessions.

Matt Muller
4
m watch
m watch
m listen
m read
m read
Engineering
lines creating a rectangle in a green background
Blog Post

A Comprehensive Approach to Securing Email

In the last two decades, email has evolved to become much more than a messaging application. Workplace email accounts have become data repositories, de-facto identities for other SaaS applications, and collaboration tools. It’s no longer sufficient to approach email security solely from the perspective of securing data in transit.

Material Team
10
m watch
m watch
m listen
m read
m read
Product
rectangles in a yellow background
Blog Post

Reimagining Access Management: Part 1

Here's a non-controversial take: access management is hard. You want to provide people with just enough access to do their jobs, but no more and no less. By granting them too much access, you put your resources at risk. Over-provisioned access is a common misconfiguration which can give attackers the ability to do more damage. Limiting access is an important way to limit the blast radius of an account compromise, which is why least privilege is one of the core pillars of information security. On the other hand, with too little access, your users can’t get their work done.

Joe Portner
10
m watch
m watch
m listen
m read
m read
Engineering
circles in a purple background
Blog Post

How a Trust-Based Culture Supports Parents

Balancing parenthood and work is no small feat. We chatted with some parents here at Material Security to learn about the trials and triumphs of this journey. They've got stories, advice, and a dash of humor to share. We're hoping their stories can make the whole juggling act feel a little less overwhelming for our fellow parents out there.

Material Team
9
m watch
m watch
m listen
m read
m read
People
circles in a blue background
Blog Post

Getting Sensitive Workflows Out of Email

As we’ve previously written about, adding Microsoft 365 and Google Workspace data into a security data lake can unlock many new use cases for security teams. This post continues our series on sharing examples on how to use this data to measure and improve your security posture.

Max Pollard
8
m watch
m watch
m listen
m read
m read
Partners
one headshot of one person in a red background
Podcast

Risky Biz Podcast: A look at running a modern phishing workflow

In this Risky Business News interview, Tom Uren asks Material Security’s Director of Security Chris Long about what it takes to run a “modern” phishing workflow. Chris thinks there are opportunities to take advantage of “phishing superusers”, employees who are a cut above when it comes to uncovering phishing and other malicious activities. Phishing is also the “point of the spear” for defenders — it provides an entry point into attacker activities that enable all sorts of potential detection opportunities.

Material Team
m watch
m watch
m listen
m read
m read
Industry Insights
No results found.
Please try different keywords.

Whitepapers & Research

Dive into our extensive library of whitepapers to gain in-depth insights and comprehensive analysis on the latest trends and technologies. Explore expert research and stay informed with valuable knowledge to drive your projects forward.

download

Material Guide to Google Workspace Security

Secure the business without slowing it down. This guide shows first/only security and IT hires exactly how to harden Google Workspace quickly, decide where native controls are enough, and where to augment—so you can ship security wins now. Fill out the form to the right to download now!

Material Security Team
m read
Get your copy
download

Material: Security and Architecture Overview

Explore Material Security's architecture, designed for robust protection of email and cloud data through a zero-trust approach.

m read
Get your copy

Video Library

Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.

TLDR Sec Demo Video Deep Dive with Clint Gibler
play button
video

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

45
m watch
Demo Video: Automated File Detection & Response for Google Drive thumbnail
play button
video

Demo Video: Automated File Detection & Response for Google Drive

Take a deeper look at Material's automated detection and response features for Google Drive.

Nate Abbott
2
m watch
Fed Gov Today Interview: Adopting the Zero Trust Mindset Thumbnail
play button
video

Fed Gov Today Interview: Adopting the Zero Trust Mindset

Abhishek joined the Fed Gov Today show with Francis Rose to explore how Federal agencies are utilizing a zero trust approach to build a resilience framework.

Material Team
5
m watch
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New