Keep Your Data Protected from Adversarial Nation States and Governments

With security and data privacy at the center of public and private sector conversations, enterprise and government organizations look to each other for guidance.

Lookout Keeps Data Safe from China

Leveraging Lookout’s configurable Phishing and Content Protection configurable engine, organizations can block all traffic to specific domains, including Chinese owned ones.

Enabling the U.S. Government To Achieve Zero Trust

In today’s environment, security teams cannot trust users that attempt to connect to their network, applications and data, even after they have authenticated.

Enabling the U.S. Government To Achieve Zero Trust

In today’s environment, security teams cannot trust users that attempt to connect to their network, applications and data, even after they have authenticated.

How Federal Agencies Balance Security and Mobility

A guide for agencies to address the cybersecurity executive order. Learn how top federal agencies manage secure telework with mobile security.

U.S. Federal Mobile Threats

Lookout analyzed its mobile security data to provide a view into the current mobile security risks facing US Federal government mobile users.

Kiersten Todt on Securing the Public Sector

In this episode, we’re joined by Kiersten Todt, Executive Director of the Presidential Commission on Enhancing National Security to discuss top cybersecurity challenges

Post-Perimeter Security for Government

See surprising mobile device trends among federal employees and learn how to implement post-perimeter security at your organization.

Lookout for Government Field Agents

Systems accessed remotely by agents contain sensitive government data, which could be used to compromise the financial well-being, privacy, and identity of US citizens.

Lookout for Federal Agencies

Get the latest guidelines related to securing mobility and how Lookout helps Federal agencies stay compliant with these new guidelines.

5 Best Practices for Achieving Zero Trust (Webinar)

More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time.

Address Today’s OMB Cybersecurity Directive

Educate government agencies on how to meet the requirements of each OMB directive and mitigate risk while allowing critical initiatives such as remote work.

Cyber Measures Gain Momentum at Federal Agencies

This study examines responses from government IT executives, decision-makers and contractors on their progress developing strategies required by the executive order.

On the Frontlines: Zero Trust Architecture in Government

Lookout was featured in the Zero Trust in Government Guide, published by Trezza Media Group in 2021 On the Frontlines Magazine. Learn more today.

A Guide for Agencies To Address Cybersecurity Exec. Order

Embark on the Zero Trust Path for Government. Lookout security experts have put together this eBook to help guide you through your Zero Trust journey.

Telework Exposed to Heightened Mobile Risk

Lookout data reveals that U.S. government organizations are exposed to hundreds of vulnerabilities from outdated operating systems and risky apps which steal credentials.

Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

Lookout data reveals that U.S. government organizations are increasingly targeted by credential stealing mobile attacks and exposed to hundreds of vulnerabilities.

Guilty Until Proven Innocent – Playing by Zero Trust Laws

Learn how Tyler Cohen Wood helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats

3 Key Considerations: Maintain Agency Cybersecurity in the BYOD Era

As agencies begin to contemplate the possibility of a more permanent telework culture, how can government successfully secure remote employees for the long-term?

New Guidance for Mobile Security

Hear from US federal CISO's on why they're adopting new guidance from NIST on how to best secure mobile users, particularly those working with sensitive government data.

Securing Telework From 2020 and Beyond

As public and private industries shift to telework, thanks to long-term innovation and short-term necessity, it’s clear that telework is here to stay. But to what scale?

Putting the “Trust” in Zero Trust: Post-Perimeter Security for Government

As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Zero Trust for mobile. Learn more in this whitepaper.