Protecting Data and Promoting Collaboration During Times of Change
Organizations that try to keep using their perimeter-based security solutions are hindering their workers’ ability to collaborate while also losing a handle on their data.
Office 365 and Azure Exploited in Massive U.S Government Hack
According to SolarWinds filings with the SEC, the involved attackers were able to compromise the company’s Microsoft Office 365 emails with forged SAML tokens.
The Internet-Based Threats Putting Your Organization at Risk
As you embrace the productivity boost that comes with using the internet as your default corporate network, you need to stay vigilant against these internet-based threats.
Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise
We're excited to announce the integration of Titus and Boldon James, leading data classification systems from Fortra, with the Lookout security service edge (SSE) solution.
From Access-centric Security to Data-centric Security
With millions of cloud apps, why would we want to use the same access-centric security approach for today's infrastructure that we used in the nineties?
Five Steps Towards Building a Better Data Security Strategy
A unified edge security platform can give you the visibility and control you need to create a modern and efficient architecture for protecting users, applications and data.
How to Mitigate Risks When Your Data is Scattered Across Clouds
As you transition to the cloud, it’s critical to have a security solution equipped to handle the risks. A unified cloud-delivered security platform is the best solution.
Privacy, SSE Adoption: My Takeaways From the 2022 Gartner SRM in London
I had the privilege of attending a number of sessions, spending time talking with analysts and digesting some of the latest cybersecurity trends and strategies.
My Journey Beyond the Perimeter: Why Firewalls Alone Can’t Protect Data
While firewalls are necessary, they aren’t sufficient. We need to evolve our security thinking from a perimeter, access control-centric view to a distributed data-centric one.
Fortify Your SD-WAN With SSE Integration
As organizations begin to combine legacy on-premises tools with cloud services, integrating SSE with existing SD-WAN will help address new cloud-based security challenges.
Protecting K-12 Student Data Requires a Comprehensive Security Solution
K-12 school systems must eliminate the patchwork of solutions that fail to meet the depth and breadth of security requirements that accompany digital education.
Higher Ed: Protecting Sensitive Data Requires a Unified Approach
Demands to protect systems and data are rising, as higher education institutions are now subject to more stringent cybersecurity and privacy expectations.
Three Lessons from the Confluence Server Vulnerability (CVE-2022-26134)
The vulnerability would allow an unauthenticated malicious actor to execute arbitrary code on a Confluence Server or Data Center instance that could grant full command.
Gaining Visibility Into SaaS Apps To Secure Your Data
Software-as-a-Service (SaaS) apps have become essential to how most of us run our organizations and stay productive — especially over the last two years.
Securing SAP SuccessFactors – Protecting Human Capital
Organizations require tighter controls to protect their multi-cloud environments and data from potential data leaks or breaches due to misconfigurations.
Building A Data-Centric Security Strategy for Your Business
Users and the applications they depend on are more widely distributed than ever, and threats continue to evolve. But “lock it down” no longer works for your business.
4 Steps to Reduce Ransomware in a Cloud First World
Today, nearly 8% of all data breaches involve ransomware, with an average cost of $4.62 million (USD).Organizations need to protect their most valuable asset: data.
Protect Enterprise Data in the Cloud From Ransomware
Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved. The scale of attacks has increased because of this.
2022 Gartner® Magic Quadrant™ for Security Service Edge
Security service edge (SSE) converges cloud-centric security capabilities to facilitate secure access to the web, cloud services (SaaS), and private applications.
SAP SuccessFactors: Best Practices To Stay Compliant
Organizations everywhere rely on SAP SuccessFactors and its leading cloud-based human capital management (HCM) platform to recruit, evaluate, and manage employees.
Protect Cloud Data in the Wake of the Pfizer Data Leak
We often associate breaches with corporate espionage and threat groups, but as the Pfizer IP leak incident showed, cloud connectivity has actually amplified security gaps.
2022 Gartner® Critical Capabilities for Security Service Edge
The Gartner Critical Capabilities for Security Service Edge is a comparative analysis that scores products or services against a set of differentiators identified by Gartner.
Lookout + Microsoft Azure Sentinel – Analytics Rule
Watch how lookout uses a sample analytics rule to allow you to create threat alerts and automatically create security incidents from within Microsoft Azure Sentinel.
Protecting Sensitive Data in Slack
See how Lookout CASB can protect sensitive data, such as a social security number, in Slack by detecting the data and masking it so that it is not shared in plain text.
Preventing Data Leakage to Personal Channels in Slack
See how Lookout prevents accidental data leakage to personal slack channels. With personal and enterprise channels often side-by-side, its easy to make this type of mistake.
Protect Personal Data and Privacy in SAP SuccessFactors
Learn how you can get detailed visibility into your entire security infrastructure, along with data protection, cyberthreat detection and compliance management.
Securing Data Collaboration in Office 365 for Remote Workers
This whitepaper provides a clear view of emerging information security challenges for organizations that have adopted Office 365 as part of their remote collaboration strategy
Securing Office 365 for Financial Services Practioners
Understand how Lookout's integrated CASB and data protection approach directly addresses Office 365 email, collaboration, and infrastructure security requirements.
Lookout Protects Against Mobile Phishing Threats
Alex Gladd, Principal Product Manager at Lookout discussed why it is important to have visibility into phishing threats and how Lookout Phishing and Content protection can help
Global Pharmaceutical Leader Enables Conditional Access
The CISO of a leading pharmaceutical organization wanted to mitigate the data leakage and compliance risks from mobile devices accessing the company's research data.
How Lookout Protects Employee Location Data
With the world’s largest mobile data set, the Lookout Cloud Security shows that more than 40% of new Android apps in 2019 collected specific user location data.
Lookout Secures the Small Business Mobile Workforce
While they may recognize the risk, smaller organizations are focused on scaling the business, and can’t allocate large amounts of time to cybersecurity.
How Lookout Protects Law Firm Client Cloud Data
A large amount of information law firms are required to keep confidential is accessed outside the four walls of a firm, outside the reach of traditional security tools.
Lookout for Government Field Agents
Systems accessed remotely by agents contain sensitive government data, which could be used to compromise the financial well-being, privacy, and identity of US citizens.
Why Deploying MTD and EMM Together Makes Sense
Employees are frequently working from mobile devices, organizations must provide mobile employees secure and flexible access to cloud-based enterprise data.
Lookout for Financial Services
As financial professionals increasingly conduct business from mobile devices, sensitive information continues to flow beyond the reach of traditional security perimeters.