How to Manage Risk at the Mobile Endpoint

We help Federal Agencies Align to OMB and NIST Standards. Stay compliant with Zero Trust OMB mandates and NIST 800-124 Rev. 2. Lookout helps agencies reduce risk of advanced cyber threats that start at the mobile device.

Keep Your Data Protected from Adversarial Nation States and Governments

With security and data privacy at the center of public and private sector conversations, enterprise and government organizations look to each other for guidance.

Lookout Keeps Data Safe from China

Leveraging Lookout’s configurable Phishing and Content Protection configurable engine, organizations can block all traffic to specific domains, including Chinese owned ones.

Cyber Measures Gain Momentum at Federal Agencies

This study examines responses from government IT executives, decision-makers and contractors on their progress developing strategies required by the executive order.

Enabling the U.S. Government To Achieve Zero Trust

In today’s environment, security teams cannot trust users that attempt to connect to their network, applications and data, even after they have authenticated.

On the Frontlines: Zero Trust Architecture in Government

Lookout was featured in the Zero Trust in Government Guide, published by Trezza Media Group in 2021 On the Frontlines Magazine. Learn more today.

A Guide for Agencies To Address Cybersecurity Exec. Order

Embark on the Zero Trust Path for Government. Lookout security experts have put together this eBook to help guide you through your Zero Trust journey.

U.S. Federal Mobile Threats

Lookout analyzed its mobile security data to provide a view into the current mobile security risks facing US Federal government mobile users.

How Federal Agencies Balance Security and Mobility

A guide for agencies to address the cybersecurity executive order. Learn how top federal agencies manage secure telework with mobile security.

Telework Exposed to Heightened Mobile Risk

Lookout data reveals that U.S. government organizations are exposed to hundreds of vulnerabilities from outdated operating systems and risky apps which steal credentials.

Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

Lookout data reveals that U.S. government organizations are increasingly targeted by credential stealing mobile attacks and exposed to hundreds of vulnerabilities.

3 Key Considerations: Maintain Agency Cybersecurity in the BYOD Era

As agencies begin to contemplate the possibility of a more permanent telework culture, how can government successfully secure remote employees for the long-term?

Federal Systems Integrator Secures Against Mobile Phishing

“Lookout enables people to work the way they want on their phones,” says security architect.

Post-Perimeter Security for Government

See surprising mobile device trends among federal employees and learn how to implement post-perimeter security at your organization.

Post-Perimeter Security for Field Agents

Survey reveals phishing attacks targeting remote government field agents on mobile devices.

Lookout for Government Field Agents

Systems accessed remotely by agents contain sensitive government data, which could be used to compromise the financial well-being, privacy, and identity of US citizens.

Putting the “Trust” in Zero Trust: Post-Perimeter Security for Government

As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Zero Trust for mobile. Learn more in this whitepaper.

Nation State Mobile Surveillanceware Using Phishing To Con Victims

Lookout Security Intelligence has discovered a set of custom Android and iOS surveillanceware tools we’re respectively calling Stealth Mango and Tangelo.

Lookout for Federal Agencies

Get the latest guidelines related to securing mobility and how Lookout helps Federal agencies stay compliant with these new guidelines.

Why Should Enterprises Care About APTs? Defend Against Chinese, Russian Cyber Espionage Hacking Groups and Other Nation-State Actors

APTs aren’t just the concerns of national governments. See why private enterprises need to pay attention to these threat actors and their campaigns.

Mitigating Cloud Supply-Chain Risk: Office 365 and Azure Exploited in Massive U.S Government Hack

According to SolarWinds filings with the SEC, the involved attackers were able to compromise the company’s Microsoft Office 365 emails with forged SAML tokens.

BYOD and Phishing Attacks: Top Threats Facing US Government

Lookout recently released our 2022 US Government Threat Report and we've picked out the main takeaways about the top threats currently facing U.S. government organizations.

Protecting Sensitive and Regulated Data in University and Government Healthcare Systems Requires a Unified Approach

To ensure that they are protected against intrusion, compromise, disruption and data exfiltration, hospital systems need to rethink the way they deploy cybersecurity.

Cybersecurity at the Tactical Level: The Importance of StateRAMP

Rather than tackle new security gaps in isolation, state and local governments need the resources and expertise of the federal government and the private sector.

Lookout and U.S. Govt. on New Vision for Zero Trust

We're excited that we have been selected by the National Institute of Standards and Technology (NIST) to collaborate on its Zero Trust architecture development efforts.

Four Steps to Modernizing Government Cybersecurity | Zero Trust

It is vital for agencies to understand the steps they can take right now to implement Zero Trust to safeguard against modern cyber attacks and comply with new regulations.

Mission Possible: Kiersten Todt on Securing the Public Sector

I recently had the pleasure of having Kiersten Todt, Managing Director of the Cybersecurity Readiness Institute, on the Endpoint Enigma podcast.

Top Three Threats Facing US Government Employees Amid Telework

All levels of government are increasingly exposed to credential-harvesting mobile attacks as well as risks from adware and outdated operating systems.

The Federal Office Has a New Look: Here’s How to Keep it Secure

To fully secure a telework environment, agencies need to tackle two objectives – mobile threat awareness and a comprehensive mobile endpoint security strategy.

Q&A: Michael Kaiser on State of Election Campaign Security

According to Tech for Campaigns, 90% of presidential campaigns’ 2018 digital campaign ad spend was delivered to mobile devices.

The Increasing Need for Mobile Security Among U.S. Federal Agencies

Employees are accessing sensitive data through their personal smartphones and tablets while they’re outside the protective perimeter of the office.

Protecting Government Agencies From Phishing Attacks

Lookout Phishing & Content Protection is designed to keep the public sector secure from phishing attacks in a mobile-first world. Learn more today.

The Government IT Problem: Your Security Perimeter Has Disappeared

Government work has changed. Critical data needed for employees to work has moved to the cloud and needs to be accessible from any device, wherever employees are.

Q&A: An Update on FISMA Mobility Metrics for Federal Agency Leaders

Victoria Mosby, Federal Sales Engineer for Lookout, shares insights and talks about what needs to be done to strengthen the government’s overall mobile security posture.

An Inside Look at Nation-State Cyber Surveillance Programs

Based on attacker communications found on a command and control server, this talk provides rare insight into a nation state’s $23 million surveillance program.

Texts and Their Impact on Election Campaign Security

Lookout recognized that mobile devices could influence the elections, so that is why we held a special briefing on Capitol Hill in early October.

Day of Shecurity: The Top Women in Federal Cybersecurity

Now is the time to change the status quo by advocating more women to consider cybersecurity as a possible career path.

Government Employees Being Human: How Mobile Behavior Impacts Security

The federal government has moved aggressively in recent years to put mobile technology into the hands of its workforce.

Mobile Security at the Center of Federal Internet of Things (IoT)

The "Internet of Things Cybersecurity Improvement Act of 2017," ensures that vendors selling IoT devices to the U.S. government meet certain cybersecurity standards.

Better Federal Mobile Security — An Interview With Kiersten Todt

Over the past decade, the federal government has followed the rest of society in a general move towards mobility.

Federal IT Change and the Leaders Making It Happen

2018 will bring the most change on the federal IT front in the past two decades, with the move to mobile being a major catalyst.

The Single Biggest Misconception in Government Security Today: Federal Agencies Aren’t Being Attacked on Mobile

Government agencies are being actively attacked on mobile, according to a new Lookout survey of 200 security and IT professionals.

Why Government Should Embrace Personal Technology, Not Ban It

The recognition that mobile devices are insecure is a step in the right direction, but I have to wonder, is a ban the answer?

Lookout & DHS Partnership | Best Mobile Security for Govt. Agencies

Today, DHS S&T announced it is partnering with Lookout to enhance the powerful Lookout Mobile Endpoint Security solution for government agencies.

Q&A With Bob Stevens: Where Federal Agencies Are Putting Their Dollars in Mobile Security

Lookout VP of Federal Bob Stevens disusses how the Spectrum of Mobile Risk impacts government agencies and organizations.

DHS Study Confirms Federal Agencies Need to Take Immediate Steps to Secure Mobility

This study on Mobile Device Security affirms that mobile security is critically important for our nation's cybersecurity.

5 Non-Negotiable Principles to Combat Cyber War on Mobile

Cyber war is a term the U.S. government is intimately familiar with, but woefully unprepared for when it comes to mobile.

Presidential Commission on Enhancing National Cybersecurity: Prioritize Mobile Security Now

The Presidential Commission on Enhancing National Cybersecurity saying; de-prioritizing mobile security is no longer an option.

Protect Your Agency's Data from Adversarial States and Governments

Learn from our security experts how to stop phishing attacks and restrict apps that communicate with foreign adversarial nation states.

5 Best Practices for Achieving Zero Trust

More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time.

Lookout | GovLoop Academy

This course, developed in collaboration with Lookout, explores the key risks of app security and highlights two tools that can help you assess and address those risks.

Guilty Until Proven Innocent – Playing by Zero Trust Laws

Learn how Tyler Cohen Wood helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats

New Guidance for Mobile Security

Hear from US federal CISO's on why they're adopting new guidance from NIST on how to best secure mobile users, particularly those working with sensitive government data.

Securing Telework From 2020 and Beyond

As public and private industries shift to telework, thanks to long-term innovation and short-term necessity, it’s clear that telework is here to stay. But to what scale?

Mission Possible: Kiersten Todt on Securing the Public Sector

When it comes to defending a nation, a strong cybersecurity plan is vital. In this episode, we’re joined by Kiersten Todt, Executive Director of the Presidential Commission on Enhancing National Security and Managing Director of the Cyber Readiness Institute to discuss the top cybersecurity challenges facing the U.S. public sector.

No items found.