No items found.

The Sleeping Giant is Waking Up: the State of Mobile Security Today ft. Cile Montgomery/VMware

In this episode, host Hank Schless is joined by Cile Montgomery, Product Line Marketing Manager at VMware, to discuss the new risks mobile devices present to organizations.

Soap Suds: The Return of SharkBot

SharkBot, a notorious banking trojan, has just resurfaced since it was first spotted in October 2021. In this newest variation, the malware targets banking credentials.

The Twilio Breach and Phishing: Lessons Learned

Twilio, Cloudflare and other organizations reported employees were targeted with a phishing campaign leveraging a kit codenamed 0ktapus.

How to Tackle Speed and Complexity in Security

On this week’s episode, host Hank Schless is joined by Ramy Houssaini, head of privacy and cyber risk at BNP Paribas, to discuss the top security considerations for CISOs.

Risky Business: How to Win Over Your Boards of Directors

On this week’s Security Soapbox, our host Hank Schless is joined by Paul Simmonds, CEO of the Global Identity Foundation to discuss how to cut through buzzwords.

Zero Trust Is a Shared Responsibility (Feat. Google)

On this week’s Security Soapbox, Ashish Kathapurkar and Nikhil Sinha from Google join Hank Schless to discuss the requirements of securing cloud apps and the right approach

Cyber Readiness and the Russia-Ukraine War

Listen in on this 5-minute Fridays episode where I discuss what’s going on in Ukraine and how organizations can be cyber ready.

Are You the Unintended Victim of a Supply Chain Attack?

In this episode, host Hank Schless is joined by Vodafone security experts Andy Deacon and Verity Carter-Johnson to define what a supply chain is, and the risks involved

Better Preparing the Workforce for Cybersecurity Threats

Phishing attacks are becoming an increasingly common avenue for threat actors to deploy malware and ransomware.

Zero Trust: How To Assess Your Security Posture

In this episode, host Hank Schless is joined by Andy Olpin, Solutions Engineer at Lookout to explain Zero Trust and discuss how organizations can use it

Is 2022 the Beginning of the End of On-Prem Security?

Tune into our annual predictions episode to hear what Lookout CTO of SASE Products Sundaram Lakshmanan thinks will happen next year.

Achieving Zero Trust for a Mobile Workforce

On this week’s Endpoint Enigma, VMware Staff EUC Solutions Engineer, Art Ashmann joins Hank Schless to discuss how mobile and cloud technology enable remote-work.

Know Thy Enemy: What Is Pegasus and What Can You Do?

Veteran of the cybersecurity industry, Joseph Davis of Microsoft, explains how spyware came to be, its implications and how you can protect yourself and your organization

Why Cybersecurity Needs To Live in the Cloud

Hank Schless and Lookout head of sales engineering for International, Tom Davison, discuss the differences between on-premise security and cloud-delivered solutions.

Why It’s Time To Move On From VPNs

On this week’s Endpoint Enigma, Lookout CTO of SASE Products Sundaram Lakshmanan joins Hank Schless to discuss why VPNs fall short, and what the best alternative is.

Healthcare Security in the Age of 5G and Remote Work

On this week’s Endpoint Enigma, Mike Murray, CEO of Scope Security discusses what healthcare looks like in the age of 5G and our work-from-anywhere world.

Kiersten Todt on Securing the Public Sector

In this episode, we’re joined by Kiersten Todt, Executive Director of the Presidential Commission on Enhancing National Security to discuss top cybersecurity challenges

Women Making Waves in Cybersecurity

This episode, Lookout threat researcher Kristina Balaam, our guest host, discusses the importance of diversity in cybersecurity with federal sales engineer Victoria Mosby.

New Year, New Challenges?

Join host Hank Schless, threat researcher Kristina Balaam and Christoph Hebeisen, head of the Lookout Threat Research team, to find out what’s going on with privacy.

The Supply Chain Reaction: Lessons from SolarWinds

In this episode, Tim LeMaster, Director of Systems Engineering at Lookout, discusses SolarWinds and how a Zero Trust security model can safeguard your infrastructure.

Threat Hunt With the Right Red Thread

Alex Gladd, Principal Product Manager joins us to talk about why you can’t stop breaches without including mobile devices as part of your threat hunting efforts.

The Supply Chain Reaction

Alex Gladd, Principal Product Manager joins us to talk about why you can’t stop breaches without including mobile devices as part of your threat hunting efforts.

Desktop Security With Wheels Isn’t Mobile

In this episode, we’re joined by Aaron Cockerill, Chief Strategy Officer at Lookout to discuss the difference between securing mobile endpoints compared to desktops and laptops.

It’s All About Phishing

Tune in to find out how the likes of WhatsApp, Twitter, and Tinder have made phishing so dangerous on the mobile device.

Management Isn’t Security

In this episode, we chat with our mobile security experts to find out why MDM in and of itself not security and what the best way to protect an organization’s mobile devices is.

For a Secure Remote Workforce

In this pilot episode our guest, David Richardson will expose some of those threats and review the challenges and solutions to quickly adapt to a secure remote workforce.