How to Mitigate Risks When Your Data is Scattered Across Clouds

As you transition to the cloud, it’s critical to have security that is equipped to handle the risks. A unified cloud-delivered security platform is the best solution.

How to Reduce Risk and Secure Data With Security Service Edge (SSE)

SSE is all about consolidating your security technology in the cloud, reducing complexity and enhancing data security so employees can access resources from anywhere.

Data Protection on the Internet: Data Leakage Prevention for ChatGPT, Generative AI, and Shadow IT

Generative AI platforms like ChatGPT have emerged as a new frontier of shadow IT, creating a new data protection challenge.

Cloud Application Security: What Every Organization Needs to Know About Protecting Data in SaaS Apps

IT teams must find a way to secure SaaS apps, and existing security solutions simply aren’t designed to protect sensitive data in the cloud.

Protecting Data and Promoting Collaboration During Times of Change

Organizations that try to keep using their perimeter-based security solutions are hindering their workers’ ability to collaborate while also losing a handle on their data.

Mitigating Cloud Supply-Chain Risk: Office 365 and Azure Exploited in Massive U.S Government Hack

According to SolarWinds filings with the SEC, the involved attackers were able to compromise the company’s Microsoft Office 365 emails with forged SAML tokens.

Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise

We're excited to announce the integration of Titus and Boldon James, leading data classification systems from Fortra, with the Lookout security service edge (SSE) solution.

Privacy, SSE Adoption: My Takeaways From the 2022 Gartner SRM in London

I had the privilege of attending a number of sessions, spending time talking with analysts and digesting some of the latest cybersecurity trends and strategies.

My Journey Beyond the Perimeter: Why Firewalls Alone Can’t Protect Your Data

While firewalls are necessary, they aren’t sufficient. We need to evolve our security thinking from a perimeter, access control-centric view to a distributed data-centric one.

Fortify Your SD-WAN With SSE Integration

As organizations begin to combine legacy on-premises tools with cloud services, integrating SSE with existing SD-WAN will help address new cloud-based security challenges.

Protecting K-12 Student Data and Complying With Privacy Standards Requires a Comprehensive Security Solution

K-12 school systems must eliminate the patchwork of solutions that fail to meet the depth and breadth of security requirements that accompany digital education.

Higher Ed Campuses Have Digitized: Protecting Sensitive Data Requires a Unified Approach

Demands to protect systems and data are rising, as higher education institutions are now subject to more stringent cybersecurity and privacy expectations.

Lookout Helps Leading Fintech Company Improve Data Security and Compliance

See how Lookout helped a leading FinTech provider protect customer data and reach security compliance using Secure Cloud Access with DLP.

Lookout Helps a Large Oil Company Migrate to Cloud-Based Software

Lookout helped to implement granular access control for sensitive HR data, achieve compliance, and prevent malware from being uploaded to their infrastructure.

How a Financial Services Firm Prevents Email Data Leakage with Lookout

This large financial services firm needed to ensure they were protecting data in email without increasing complexity or limiting productivity.

Securing SAP SuccessFactors – Protecting Human Capital

Organizations require tighter controls to protect their multi-cloud environments and data from potential data leaks or breaches due to misconfigurations.

Improving Data Security for SaaS Apps | CASB

Today’s security practitioners need practical guidelines and technical capabilities that support their expanding SaaS usage.

4 Best Practices for Securing Enterprise Data in MSFT 365

How to address O365 and Teams security issues.

Mitigating the Risks of GenAI: Secure Your Data & Empower Your Workforce

AI platforms collect the data submitted by end users to train their models. Any proprietary data submitted to these tools becomes publicly available.

Protect Your Agency's Data from Adversarial States and Governments

Learn from our security experts how to stop phishing attacks and restrict apps that communicate with foreign adversarial nation states.

The Missing Piece In Your Data Protection Strategy: Mobile Devices

Discover how to evolve your security strategy to protect your data at every stage of the kill chain regardless of where it’s stored.

Exclusive Partner Briefing: How Are Chinese Apps Affecting Your Customer’s Data Risk Exposure?

Recent global scrutiny of mobile apps developed by Chinese entities has put a spotlight on data collection capabilities & risk to all organizations.

Everyone Talks About TikTok but Here’s Why BYOD Is the Real Threat

How to effectively stop phishing attacks at the mobile device level and restrict usage of apps that pose a growing threat to your data and workforce.

Google + Lookout | Data Security For Your Cloud

Watch this webinar and hear case studies that exhibit how Lookout and Google partner to protect customers.

Building A Data-Centric Security Strategy for Your Business

Users and the applications they depend on are more widely distributed than ever, and threats continue to evolve. But “lock it down” no longer works for your business.

Protect Cloud Data in the Wake of the Pfizer Data Leak

We often associate breaches with corporate espionage and threat groups, but as the Pfizer IP leak incident showed, cloud connectivity has actually amplified security gaps.

What To Consider When Assessing a CASB

Gartner found CASB to be the fastest-growing cyber security segment, with investment increasing by 41.2% (2021 CIO Agenda Survey).

Securing SAP SuccessFactors To Remain Compliant

Join us for this session to learn about how Lookout CASB is uniquely positioned through its partnership with SAP

Prevent Data Leakage From Productivity Tools

Hank Schless, Senior Manager of Security Solutions at Lookout, will be joined by guest speakers to help you navigate integrated endpoints to cloud security.

Empowering Financial Services With a Secure Data Path

Visibility into mobile threats is key to protecting your valuable data from today's complex attacks. Discover more with Lookout today.

Lookout + CipherCloud: The Future of Cloud-Delivered Security

The need for an integrated endpoint-to-cloud security solution is accelerated by the proliferation of remote users. Join us to learn more.

Mobile Devices Are Leaving the Door Open to Cyberattackers

Your employees are using personal mobile devices for work and corporate mobile devices for personal use - an attack on a mobile device is an attack on your corporate data.

Risky Business – Securing Your Mobile Apps

Join us to learn how Salesforce is partnering with Lookout to provide comprehensive embedded app defense security to protect your employee and customer data.

Apps Under Attack – What You Need To Know

Lookout Threat Discovery and how you can protect yourself from compromise.

Lookout & Microsoft Integration for a Secure Mobile Workforce

Leveraging the Microsoft Endpoint Manager App Protection with Lookout capability, organizations can provide secure access to O365 and Teams apps from personal devices.

Secure Your Mobile Workforce

Allowing employees to work productively from any device and any location can open users to the risks that come with the shared nature of a mobile device.

5 Minute Friday: Red Alert-Rocket Alerts | A Malicious Threat Exploiting Societal Disruption

In this episode of Five Minute Friday, we discuss how societal disruption creates opportunities for malicious actors to exploit people's uncertainties

5 Minute Friday: Unveiling Infamous Chisel, Sandworm, and Deblind

Discover how the Russian APT group, Sandworm, known for major international cyberattacks, ventured into mobile surveillance with Infamous Chisel.

5 Minute Friday: Scattered Spider, MGM, and Caesars

Caesars Entertainment and MGM resorts were recently a target for a well-known cybercrime group, Scattered Spider. Listen to this week’s 5 Minute Friday to learn about these attacks, how this group operates, and what you can do to avoid your organization being the next target.

Soap Suds: Protect Your Data From Risky Apps Like TikTok

Recent hype around Chinese apps TikTok and Pinduoduo has put a spotlight on the risk surrounding mobile apps. In this quick-fire Soap Suds episode, host Hank Schless discusses the concerns behind these Chinese apps and highlights the reasons why organizations need to keep tabs on mobile apps in general to minimize the risk to their data.

No items found.