Federal Government
Protecting Government Agencies From Mobile Threats: A Guide
Comply with federal government standards — particularly FedRAMP and the CDM Program — to protect your agency’s sensitive data from threat actors.
How the CDM Program Strengthens Federal Cyber Resilience
Since its creation in 2012, the CDM Program has helped mitigate cyber threats to government networks — here’s how.
Detecting APT Threats on Government Devices: Insights into Federal Cyber AI Strategies
Discover federal cyber AI strategies and tools that are protecting both public and private organizations from the rise in advanced persistent threats.
What Is the MITRE ATT&CK Framework? Mapping to Today's Defensive Controls
What is the MITRE ATT&CK framework? Read to learn how this database of threat actor tactics helps organizations stay safe and meet federal standards.
Navigating FedRAMP Compliance: Why It’s Crucial for Mobile Security
Learn how ensuring FedRAMP compliance can protect mobile devices and foster strong relationships between private organizations and the U.S. federal government.
Why Should Enterprises Care About APTs? Defend Against Chinese, Russian Cyber Espionage Hacking Groups and Other Nation-State Actors
APTs aren’t just the concerns of national governments. See why private enterprises need to pay attention to these threat actors and their campaigns.
NIST 800-124 Cybersecurity Publication Revision: How to Implement Mobile Security
NIST recently released a comprehensive document offering valuable insights and guidelines for implementing robust mobile endpoint security solutions.
BYOD and Phishing Attacks: Top Threats Facing US Government
Lookout recently released our 2022 US Government Threat Report and we've picked out the main takeaways about the top threats currently facing U.S. government organizations.
Cybersecurity at the Tactical Level: The Importance of StateRAMP
Rather than tackle new security gaps in isolation, state and local governments need the resources and expertise of the federal government and the private sector.
Lookout and U.S. Govt. on New Vision for Zero Trust
We're excited that we have been selected by the National Institute of Standards and Technology (NIST) to collaborate on its Zero Trust architecture development efforts.
Protect Your Agency's Data from Adversarial States and Governments
Learn from our security experts how to stop phishing attacks and restrict apps that communicate with foreign adversarial nation states.
Lookout | GovLoop Academy
This course, developed in collaboration with Lookout, explores the key risks of app security and highlights two tools that can help you assess and address those risks.
Guilty Until Proven Innocent – Playing by Zero Trust Laws
Learn how Tyler Cohen Wood helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats