![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91a8c5_Gradient%20BK.webp)
Blog
Latest news, threat info, and security updates from the leaders in cloud security.
![Man in suit looking at smartphone in an modern office space.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/64cc2e50d19fe9c7e318b920_64ad8cecda5417d65d91d12c_63b63623e1719b0e176f54b9_63892bb30560ce6518769c66_6352ce3d458e0074a2a93aed_631b95f8bcd59ceb98ff5c91_cybersecurity-endpoint-detection-response.webp)
July 8, 2024
Cybersecurity Is Not Complete Without EDR for Mobile
Businesses are increasingly turning to mobility solutions to increase productivity. You need mobile EDR to provide visibility across all of your mobile endpoints.
June 24, 2024
What’s New With Lookout: Simplifying SSE
We are excited to announce the latest product release to the Lookout Cloud Security Platform, which builds upon the launch of our mid-market SSE offering earlier this year.
June 5, 2024
Three Questions to Ask About Your Cloud Security Posture
As your organization transforms its digital infrastructure, cybersecurity needs to go through the same transformation.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
#
results
#
filters applied
![A smartphone with displaying OpenAI's "About" page.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/6675ce99a999065334e44ae3_chatgpt-security.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
ChatGPT Security: Tips for Safe Interactions with Generative AI
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![Black woman having video chat on smartphone at home](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/6675cf83ddbcd5014dbee792_mobile-security-threats.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
7 Top Mobile Security Threats: Safeguard Your Device
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/6670900e1645b01ef8e1849b_mobile-phishing.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
The Rising Threat of Mobile Phishing and How to Avoid It
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/667090bca457bb52e665347b_cloud-security-strategy.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
Crafting a Robust Cloud Security Strategy in 2024
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![Man sitting at desk with three large computer monitors in front of him.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/64cc2e5484100f8f5bcdf812_64ad8cecda5417d65d91d12a_63b636236e90d8654c78ee95_6344483b58882dd88cce6bbf_blog_cloud_security_posture_600x300.png)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
Three Questions to Ask About Your Cloud Security Posture
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![A man's hand dangles a key by its chain.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/666329eaf5141e5b34ddb9df_credential%20theft.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
Credential Theft Protection: Defending Your Organization's Data
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![A man works on a laptop outside of a coffee shop.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/666327f8d05b6063a3d927de_casb-dlp.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
How CASB and DLP Work Together to Safeguard Data
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/6655ec5a152f4d18a309e1e0_mobile-security-made-easy.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
Security Made Easy: Mobile Security That Won’t Stretch Your IT Team
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![A woman works on her laptop at a table as she sits in front of a large glass window.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/66632be7651d8ea5e6762d44_ztna-vs-vpn.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
ZTNA vs VPN: Decoding the Best Remote Work Security Option
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![A woman works on a laptop while sitting on a couch.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/6647a792441cb94abf6682f1_7-essential-tips-to-prevent-social-engineering.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
7 Essential Tips to Prevent Social Engineering
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.