
Privacy, security and everything in between
While Zero Trust is a popular framework, it doesn’t come with a user manual. On this week’s Security Soapbox, Ashish Kathapurkar and Nikhil Sinha from Google join Hank Schless to discuss how securing your cloud apps requires an approach that goes beyond the apps’ capabilities. Check out our blog to learn more: https://bit.ly/3vAo15w
As the conflict in Ukraine continues, including in cyberspace, the rest of the world needs to be prepared. Listen in on this 5-minute Fridays episode where I discuss what’s going on in Ukraine and how organizations can be cyber ready. For more information, also check out the blog I wrote on this topic: https://bit.ly/3MMIuMu
Between SolarWinds and Log4J, supply chain attacks have become a common occurrence over the past couple of years. In this episode, host Hank Schless is joined by Vodafone security experts Andy Deacon and Verity Carter-Johnson to define what a supply chain is, what the intended and unintended consequences are, and what legal ramifications exist for those who fall victim.
Phishing attacks are becoming an increasingly common avenue for threat actors to deploy malware and ransomware. An organization’s first line of defense against these attacks is getting all employees to realize they are high-value targets.
While most of us understand Zero Trust conceptually, the path to Zero Trust is a complex and constantly evolving journey. In this episode, host Hank Schless is joined by Andy Olpin, Solutions Engineer at Lookout to scale back all the marketing noise surrounding the term and discuss how organizations can pragmatically get started with Zero Trust.
Nearly two years after we were forced to experiment with remote work, 2022 will be an inflection point for both threats and cybersecurity solutions. Tune into our annual predictions episode to hear what Lookout CTO of SASE Products Sundaram Lakshmanan thinks will happen next year. We'll be discussing everything from software supply chains to threat hunting and data protection.
Widespread remote work has called for a paradigm shift in how we conduct enterprise cybersecurity. On this week’s Endpoint Enigma, VMware Staff EUC Solutions Engineer, Art Ashmann joins Hank Schless to discuss how mobile and cloud technology have enabled us to manage both work and personal responsibilities from anywhere and what organizations can do to securely take advantage of it.
First uncovered by Lookout and Citizen Lab in 2016, Pegasus was confirmed to have been used on targets such as business executives and government officials. Veteran of the cybersecurity industry, Joseph Davis of Microsoft, walks us through how spyware came to be, its implications and how you can protect yourself and your organization against Pegasus.
Cloud-delivered security solutions offer unrivaled storage flexibility and computing power. But do they introduce new risks? Join host Hank Schless and Lookout head of sales engineering for International, Tom Davison, as they discuss the differences between on-premise security solutions and cloud-delivered ones.
Businesses have relied on VPNs for over two decades. But with the rapid adoption of cloud services and mobile technology, the way we store and access data has changed. On this week’s Endpoint Enigma, Lookout CTO of SASE Products Sundaram Lakshmanan joins Hank Schless to discuss why VPNs fall short when it comes to security and user experience and what the best alternative is for providing secure network access to your remote workers.
The healthcare industry has undergone a major digital transformation since HIPAA was introduced in 1996. With technology rapidly outpacing regulations, keeping patient data safe and hospitals up and running has become more challenging than ever. On this week’s Endpoint Enigma, Mike Murray, CEO of Scope Security and former Lookout CISO sits down with host Hank Schless to assess what healthcare looks like in the age of 5G and our work-from-anywhere world.
When it comes to defending a nation, a strong cybersecurity plan is vital. In this episode, we’re joined by Kiersten Todt, Executive Director of the Presidential Commission on Enhancing National Security and Managing Director of the Cyber Readiness Institute to discuss the top cybersecurity challenges facing the U.S. public sector.
This episode, Lookout threat researcher Kristina Balaam takes over as guest host to discuss the importance of diversity in cybersecurity with federal sales engineer Victoria Mosby. Victoria is a member of the Day of Shecurity initiative and the Lookout Foundation. Tune in to hear their experiences as engineers in a traditionally male-dominated field and their advice for starting your career in cybersecurity.
2020 was an especially challenging year, including for the cybersecurity industry. But what should we expect for 2021? Join host Hank Schless, threat researcher Kristina Balaam and Christoph Hebeisen, head of the Lookout Threat Research team, to find out what’s going on with privacy, COVID-19-related threats, ransomware and other trends.
A software supply chain attack put SolarWinds in the headlines of every news publication in America. In this episode, we’re joined by Tim LeMaster, Director of Systems Engineering at Lookout, to discuss what happened, whether this could happen to mobile devices and how a Zero Trust security model can safeguard your infrastructure.
Offices are empty and people are working from home. Tablets and smartphones have become a primary way workers are staying productive. Alex Gladd, Principal Product Manager joins us to talk about why you can’t stop breaches without including mobile devices as part of your threat hunting efforts.
Tablets and smartphones are increasingly becoming the center of our personal and professional lives. In this episode, we’re joined by Aaron Cockerill, Chief Strategy Officer at Lookout. We discuss what’s different about securing mobile endpoints compared to desktops and laptops, and why desktop security can’t protect mobile.
With the proliferation of smartphones and tablets, phishing attacks are no longer what they used to be – delivered via email and opened on a desktop computer. Tune in to find out how the likes of WhatsApp, Twitter, and Tinder have made phishing so dangerous on the mobile device.
In this episode, we chat with our mobile security experts about mobile device management. Why is MDM in and of itself not security. What’s the best way to protect an organization’s smartphones and tablets? Listen in to find out.
The outbreak of COVID-19 has forced many organizations to adapt and speed up the adoption of remote working. In parallel, cyber attackers responded with a variety of new emerging threats, taking advantage of the situation. In this pilot episode our guest, David Richardson, who brings more than 10 years of experience in the mobile industry, will expose some of those threats and review the challenges and solutions in order to quickly adapt to a secure remote workforce.