Organizations Are Banning TikTok. Should You Do the Same?
The popular social media app TikTok has come up time and time again when discussing data privacy concerns. Now, state governments are banning it from government-owned devices.
BYOD and Phishing Attacks: Top Threats Facing US Government
Lookout recently released our 2022 US Government Threat Report and we've picked out the main takeaways about the top threats currently facing U.S. government organizations.
Beyond BEC: How Modern Phishing Has Evolved Past Email
Business email compromise (BEC) is big business for malicious actors. According to the 2021 FBI Internet Crime Report, BEC was responsible for $2.4 billion in cyber crimes.
Why You Need a Data-Driven Approach to Vulnerability Management
Keeping your devices secure by ensuring apps and operating systems are up to date can unfortunately be extremely complicated and error-prone with traditional tools.
Persistence and Patience: Qualities You Don’t Want in Ransomware Attackers
To help you stay ahead of the ever-evolving ransomware threat, I connected with Microsoft Chief Security Advisor, Sarah Armstrong-Smith.
How to Protect Against SMS Phishing and Other Similar Attacks
Whenever a breach occurs, we always need to think about the lessons that can be learned. Here are my tips for keeping your organization safe from mobile phishing attacks.
What Is Lockdown Mode for iOS and iPadOS and Why Should I Care?
We welcome the introduction of Lockdown Mode by Apple as an additional feature. However, we need to keep in mind that the mobile attack surface is quite complex.
Lookout Powers VMware Workspace ONE Mobile Threat Defense (MTD)
Lookout and VMware recently announced the debut of Workspace ONE Mobile Threat Defense (MTD), a mobile security solution incorporating Lookout mobile protection technologies.
Cybersecurity at the Tactical Level: The Importance of StateRAMP
Rather than tackle new security gaps in isolation, state and local governments need the resources and expertise of the federal government and the private sector.
The Olympics and Burner Phones: What About the Safety of That QR Code?
While QR codes make navigating activities at the Games easy and contactless, it creates opportunities for them to be abused for phishing purposes.
How to Keep Your Data Secure in Light of Apache Log4j Vulnerabilities
In quick succession in December, The Apache Software Foundation released information on two critical vulnerabilities in its Log4j Java-based library.
Lookout and U.S. Govt. on New Vision for Zero Trust
We're excited that we have been selected by the National Institute of Standards and Technology (NIST) to collaborate on its Zero Trust architecture development efforts.
Mobile Cyber Threat Telemetry Dataset to MSFT Azure
Lookout has extended its partnership with Microsoft to ensure our threat telemetry data is easily accessible via the Microsoft Azure Sentinel SIEM Solution.
Mobile App SDKs: The Nesting Dolls of Hidden Risk
With the number of devices being used for work everyday — especially as more employees bring their own devices — it’s impossible for security and IT...
Four Steps to Modernizing Government Cybersecurity | Zero Trust
It is vital for agencies to understand the steps they can take right now to implement Zero Trust to safeguard against modern cyber attacks and comply with new regulations.
Lookout and NTT DOCOMO Partner to Deliver Identity Security
DOCOMO has selected Lookout to power the Dark Web Monitoring capabilities of DOCOMO’s Anshin Security Platform across both iOS and Android devices.
Expanded Partnership with Google Cloud | Zero Trust Security
Today, I’m excited to announce Lookout has entered into an expanded partnership with Google Cloud to deliver endpoint-to-cloud security to organizations around the world.
Lookout Named Best Mobile Security Solution by the SC Awards
I’m pleased to share that Lookout Mobile Endpoint Security has achieved yet another leadership milestone by being named SC Awards’ Best Mobile Security Solution of 2021.
Telkomsel Partnership to Deliver Mobile Device/App Security
We're excited that Telkomsel has partnered with Lookout to launch Telkomsel Mobile Endpoint Protection (MEP) and Telkomsel Mobile App Protection (MAP).
Top Three Threats Facing US Government Employees Amid Telework
All levels of government are increasingly exposed to credential-harvesting mobile attacks as well as risks from adware and outdated operating systems.
Pharma on the Hook: Cyberattackers Phishing for Your Secret Formulas
We found that 77 percent of mobile phishing attempts on pharmaceutical organizations through the third quarter of 2020 intended on delivering malware.
Lookout and Verizon Committed to Protecting Small Businesses
Verizon recently announced the launch of Business Mobile Secure, a full security solution designed specifically for small and medium business customers.
Cybersecurity Is Not Complete Without EDR for Mobile
Businesses are increasingly turning to mobility solutions to increase productivity. You need mobile EDR to provide visibility across all of your mobile endpoints.
Mobile EDR for Security Professionals by Security Professionals
Lookout has announced the introduction of threat hunting & research into the Lookout Security Platform. See how this changes the threat discovery landscape.
Shadow IT Shaken With a Mobile Twist
In the strictest sense, most of us are operating a shadow IT operation. As we continue to work from home, each of us is using networks that our IT teams have no control over.
Why Should Defense Contractors Care About CMMC?
With CMMC, contractors will have to be certified by a third party ahead of doing work with the DoD. This is a significant departure from the previous procedure.
Vulnerability Management is Complicated Without a Data-Driven Approach
One of the most important actions you can take to keep your smartphones and tablets secure is to make sure their apps and operating systems are up to date.
Got MDM? Here Are Five Reasons Why You Still Need Mobile Security
MDM is a valuable component of an organization’s mobile strategy. But you also need mobile security to make sure your sensitive data is protected.
Five Step UEBA to Detect and Stop Insider Attacks
While organizations invest substantially into security solutions, one thing overlooked is the communication between apps and devices in the cloud-mobile environment.
Mobile Phishing Encounters Surged by 37% Amid Shift To Work-From-Home
Mobile Phishing Spotlight Report - Lookout revealed that enterprise mobile phishing encounter rates surged 37% between the last quarter of 2019 and the first quarter of 2020.
Achieving Unified Endpoint Security: Lookout and VMware Carbon Black
With this UES solution, security teams can use a centralized dashboard to monitor the security of all endpoints accessing resources – both mobile and fixed endpoints.
How to Embrace Mobility in Response to a Remote Workforce
Because of Coronavirus, organizations may want to rush into adopting a BYOD program so that employees can work more effectively from home. But what about the new risks?
Lookout Partners With Google To Protect Users From App Risk
With this partnership, Lookout can stop malicious apps before they become a threat by scanning apps submitted to the Google Play Store before they are available for download.
The Government IT Problem: Your Security Perimeter Has Disappeared
Government work has changed. Critical data needed for employees to work has moved to the cloud and needs to be accessible from any device, wherever employees are.
Schneider Electric Secures 50k Devices with Lookout MES
By selecting Lookout Mobile Endpoint Security, Schneider Electric gained immediate visibility into the mobile security and risk posture of its mobile users.
Lookout & VMWare Partner to Tackle Mobile Threats
Lookout has completed its integration with the VMware Workspace ONE Intelligence platform, providing organizations with a consolidated view of their digital environment.
Q&A: An Update on FISMA Mobility Metrics for Federal Agency Leaders
Victoria Mosby, Federal Sales Engineer for Lookout, shares insights and talks about what needs to be done to strengthen the government’s overall mobile security posture.
PSD2 Compliance: Mobile App Security for Your Payment Apps
The security requirements mandated by the Revised Payment Services Directive (PSD2) directive create the need for stronger authentication and secure payment transactions.
Helping Higher Education Tackle Today’s Cybersecurity Challenges
The perimeter has fully disappeared, and thankfully there are solutions that allow higher education institutions to safely and securely leverage innovation.
What is Lookout Continuous Conditional Access?
To create trust for devices in a post-perimeter world, Lookout Continuous Conditional Access works behind the scenes, dynamically monitoring the health of the endpoint.
2018 Gartner Market Guide for Mobile Threat Defense
Gartner Market Guide for Mobile Threat Defense has a message: “Security and risk management leaders should leverage MTD to address evolving mobile security needs."
Lookout Integration With the Microsoft Graph Security API
Announced at Microsoft Ignite, this integration will enable Lookout mobile security threat information to be accessible from the Microsoft Graph Security API.
Lookout Brings Mobile Security to SentinelOne Customers
Together with Lookout, SentinelOne will now be able to offer organizations a way to secure mobile endpoints as thoroughly as they protect traditional endpoints.
Verizon & Lookout Bring Mobile Endpoint Security to Business Customers
Lookout and Verizon are teaming to help more enterprises and SMBs secure mobile communications (or data) across personal and corporate owned devices.
Mobile Phishing: The Biggest Unsolved Problem in Cybersecurity
Mobile phishing brings together new channels for phishing employees and reduced screen size, causing one of the biggest problems businesses have faced in cybersecurity yet.
Forrester’s Now Tech Mobile Security Report: The 2018 Vendor Landscape
To achieve comprehensive security, enterprises must choose solutions that complement their existing security ecosystem. Forester’s new Now Tech report reinforces this fact.
Mobile Threat Defense: The Drawbacks of “On-Device” MTD Solutions
Understanding each vendor’s technology approach and philosophy behind these solutions and the real implications on cybersecurity effectiveness.
Why Your GDPR Compliance Strategy Must Include Mobile
When considering compliance, enterprises must put mobile devices on even footing with desktops. This is especially true when the GDPR takes effect.
Lookout Is ISO 27001, FedRAMP, and Privacy Shield Certified
When government agencies and multinational companies choose a security solution it's critical that they are able to trust those solutions to handle data securely.
3 Insights From the Gartner Hype Cycle for Mobile Security 2017
Gartner recently released its July 2017 Hype Cycle for Mobile Security 2017, confirming that mobile threat defense (MTD) has matured as a key enterprise security technology.
Introducing Network Protection for Mobile Man-in-the-Middle Attacks
Today we are excited to announce the availability of network protection, an automated on-device analysis of network connections that defends against man-in-the-middle attacks
Data Compromise via Mobile Threats: Enterprises Are Facing Attacks
Mobile threats are more complex than a piece of malware in a third-party app store. In this blog post we dissect the “threats” component of the Mobile Risk Matrix.
Understanding Data Leakage From Mobile App Behaviors & Configurations
When many enterprises consider threats to their data via mobile apps, they rightfully think of malware. However, there are many less obvious ways that apps leak data.
Securing Enterprise Mobility Is Driving Record Growth at Lookout
Controlling mobile access to corporate data is a top priority and proactive CISOs are selecting Lookout to accelerate secure mobility in the workplace.
Microsoft and Lookout: Securing All Your Endpoints Begins Today
Today, we are excited to announce that the Lookout Mobile Endpoint Security integration with Microsoft Enterprise Mobility + Security (EMS) is now generally available.
MDM Solutions Don’t Deliver Sufficient Protection Against Pegasus
A Mobile Device Management (MDM) solution is not by itself a sufficient protection against advanced, targeted threats like the Pegasus spyware.
3 Things CISOs Need To Know About the Trident iOS Vulnerabilities
Trident allows an adversary to silently jailbreak an iOS device and stealthily spy on victims, collecting information from apps. Here’s what CISOs should know.
5 Active Mobile Threats Spoofing Enterprise Apps
Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it's trouble for IT departments everywhere.
4 Steps to Reduce Ransomware in a Cloud First World
Today, nearly 8% of all data breaches involve ransomware, with an average cost of $4.62 million (USD).Organizations need to protect their most valuable asset: data.
Ransomware Attack Myths and How To Mitigate Risk
Learn how can protect your data from being held hostage from Microsoft Chief Security Advisor, Sarah Armstrong-Smith and Lookout Chief Strategy Officer, Aaron Cockerill.
As Organizations Evolve, So Does Ransomware
As your organization continues to support remote work and execute cloud transformation initiatives, ransomware continues to find ways to compromise your systems.
Protect Enterprise Data in the Cloud From Ransomware
Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved. The scale of attacks has increased because of this.
Ransomware: A Cloudy Forecast (Swedish Edition)
Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved. IMPORTANT NOTE: The presenters speak in Swedish.
Cyber Measures Gain Momentum at Federal Agencies
This study examines responses from government IT executives, decision-makers and contractors on their progress developing strategies required by the executive order.
Securing Healthcare Against Ransomware Post-COVID-19
The rapid move to the cloud has provided healthcare organizations the ability to continue services during the global pandemic but has also brought about new attack vectors.
Protecting Data and Achieving Compliance in Hybrid Cloud Environments
As healthcare organizations move to supporting remote work for clinical and business staff, they’ll need to find ways to reduce cybersecurity risks.
On the Frontlines: Zero Trust Architecture in Government
Lookout was featured in the Zero Trust in Government Guide, published by Trezza Media Group in 2021 On the Frontlines Magazine. Learn more today.
The Sleeping Giant is Waking Up: the State of Mobile Security Today ft. Cile Montgomery/VMware
In this episode, host Hank Schless is joined by Cile Montgomery, Product Line Marketing Manager at VMware, to discuss the new risks mobile devices present to organizations.
Soap Suds: The Return of SharkBot
SharkBot, a notorious banking trojan, has just resurfaced since it was first spotted in October 2021. In this newest variation, the malware targets banking credentials.
How Federal Agencies Can Revamp Their Mobile Security
Watch the full interview with Tony D’Angelo and learn more about re-prioritizing mobile device security to establish a more secure network security posture.
The “Just Because” of Zero Trust | OptivCon 2021 Interview
Lookout Chief Marketing Officer Mike Banic speaks with Senior Manager of Security Solutions Hank Schless on how Zero Trust has evolved and the current context around it.
Lookout + Microsoft Azure Sentinel – Analytics Rule
Watch how lookout uses a sample analytics rule to allow you to create threat alerts and automatically create security incidents from within Microsoft Azure Sentinel.
Addressing Threats to U.S. Critical Infrastructure
Nextgov editor James Hanson recently sat down with Aaron Cockerill for a virtual conversation shaped by today’s topics of critical infrastructure and cybersecurity threats.
Why Cybersecurity Needs To Live in the Cloud
Hank Schless and Lookout head of sales engineering for International, Tom Davison, discuss the differences between on-premise security and cloud-delivered solutions.
Maintaining Effective Data Protection in a World of Telework
Watch this session on how Lookout can support the goals of top security leaders across federal, state and local agencies and learn cybersecurity trends and strategies.
Lookout + Google MDM – Full Integration Overview
Demo of how to stand up the Google + Lookout integration from both the Google and Lookout Admin dashboards, and a demo of Context Aware Access in action
Modernizing Government Cybersecurity With Zero Trust
Learn about the commitment Lookout has made to keeping federal, state and local agencies secure through our platform, providing enhanced coverage from endpoint to cloud.
Healthcare Security in the Age of 5G and Remote Work
On this week’s Endpoint Enigma, Mike Murray, CEO of Scope Security discusses what healthcare looks like in the age of 5G and our work-from-anywhere world.
Kiersten Todt on Securing the Public Sector
In this episode, we’re joined by Kiersten Todt, Executive Director of the Presidential Commission on Enhancing National Security to discuss top cybersecurity challenges
Women Making Waves in Cybersecurity
This episode, Lookout threat researcher Kristina Balaam, our guest host, discusses the importance of diversity in cybersecurity with federal sales engineer Victoria Mosby.
The Supply Chain Reaction: Lessons from SolarWinds
In this episode, Tim LeMaster, Director of Systems Engineering at Lookout, discusses SolarWinds and how a Zero Trust security model can safeguard your infrastructure.
Lookout Protects Against Mobile Phishing Threats
Alex Gladd, Principal Product Manager at Lookout discussed why it is important to have visibility into phishing threats and how Lookout Phishing and Content protection can help
Global Pharmaceutical Leader Enables Conditional Access
The CISO of a leading pharmaceutical organization wanted to mitigate the data leakage and compliance risks from mobile devices accessing the company's research data.
Desktop Security With Wheels Isn’t Mobile
In this episode, we’re joined by Aaron Cockerill, Chief Strategy Officer at Lookout to discuss the difference between securing mobile endpoints compared to desktops and laptops.
Management Isn’t Security
In this episode, we chat with our mobile security experts to find out why MDM in and of itself not security and what the best way to protect an organization’s mobile devices is.
How Lookout Protects Employee Location Data
With the world’s largest mobile data set, the Lookout Cloud Security shows that more than 40% of new Android apps in 2019 collected specific user location data.
Mobile Security Made Easy for Small Business
Securing corporate data from these risks shouldn’t be a roadblock for productivity, but rather a set of practices to ensure employees aren’t putting their organizations at risk.
Identifying Phishing Attacks Targeting Verizon Customers
Lookout recently discovered a new phishing attack targeting Verizon customers. The attacker developed a mobile specific site designed to resemble a Verizon app.
Lookout for Personal & Small Business
We secure mobility for the world's largest enterprises, the highest levels of government, hundreds of thousands of small businesses, and tens of millions of individuals.
Lookout Mobile Endpoint Security for Small Business
As more organizations rely on mobile devices and applications to store and access sensitive data, malicious actors are aggressively going after mobile devices.
Lookout + VMware Workspace One Intelligence
Organizations are increasingly adopting formal mobility programs to empower mobile productivity.Here's why you need a unified endpoint to cloud solution to protect data.
Caring for Patients Isn’t Your Only Job
Your healthcare data infrastructure is a lucrative target for cyberattackers because it holds protected health information that is strictly regulated and must be secure.
MTD-MDM-MAM Comparison – Healthcare (HIPAA)
With over 32 million patient records breached in 2019 , the healthcare industry must refine its security strategy to get ahead of hackers. Here's which strategy to use.
Lookout Proof of Concept Overview
Powered by the largest dataset of mobile code, with over 170M devices and 70M apps, the Lookout Security Cloud provides visibility into the entire spectrum of mobile risk.
How Lookout Enables CCPA Compliance
Firms will need to re-examine their data protection strategies to ensure they are meeting ‘reasonable security’ standards in an era of increasingly sophisticated cyberthreats.
Lookout Secures the Small Business Mobile Workforce
While they may recognize the risk, smaller organizations are focused on scaling the business, and can’t allocate large amounts of time to cybersecurity.
PSD2 – Driving the Need To Secure Mobile Banking Apps
Cyber criminals, have upped the ante on targeting mobile app users. This is driving increased regulation, mandating additional security for mobile banking and payment apps.