New

Organizations Are Banning TikTok. Should You Do the Same?

The popular social media app TikTok has come up time and time again when discussing data privacy concerns. Now, state governments are banning it from government-owned devices.

New

BYOD and Phishing Attacks: Top Threats Facing US Government

Lookout recently released our 2022 US Government Threat Report and we've picked out the main takeaways about the top threats currently facing U.S. government organizations.

Mission Possible: Kiersten Todt on Securing the Public Sector

I recently had the pleasure of having Kiersten Todt, Managing Director of the Cybersecurity Readiness Institute, on the Endpoint Enigma podcast.

The Federal Office Has a New Look: Here’s How to Keep it Secure

To fully secure a telework environment, agencies need to tackle two objectives – mobile threat awareness and a comprehensive mobile endpoint security strategy.

New

Is Your Mobile Device Secure? The Democratic Process Could Depend on It.

Discover why the role and importance of mobile devices in our democratic process will continue to increase into the future. Learn more today with Lookout.

New

The Increasing Need for Mobile Security Among U.S. Federal Agencies

Employees are accessing sensitive data through their personal smartphones and tablets while they’re outside the protective perimeter of the office.

New

NIST Updates Its Mobile Security Guidelines: What’s Changed Since 2013

Since the NIST first released its enterprise mobile device security guidelines Special Publication (SP) 800-124 in 2013, the work environment has gone through massive changes.

New

Lookout Achieves FedRAMP Authorization to Operate with JAB P-ATO

Lookout is now the only mobile endpoint security solution to achieve one of the most comprehensive risk assessments of a cloud service offering (CSO).

Protecting Government Agencies From Phishing Attacks

Lookout Phishing & Content Protection is designed to keep the public sector secure from phishing attacks in a mobile-first world. Learn more today.

New

Protecting Customers From Data Compromise | Lookout App Defense

Lookout App Defense provides enterprises with proactive mobile app security by preventing data compromise of customer-facing mobile apps.

New

Day of Shecurity: The Top Women in Federal Cybersecurity

Now is the time to change the status quo by advocating more women to consider cybersecurity as a possible career path.

5 Best Practices for Achieving Zero Trust (Webinar)

More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time.

Address Today’s OMB Cybersecurity Directive

Educate government agencies on how to meet the requirements of each OMB directive and mitigate risk while allowing critical initiatives such as remote work.

Cyber Measures Gain Momentum at Federal Agencies

This study examines responses from government IT executives, decision-makers and contractors on their progress developing strategies required by the executive order.

On the Frontlines: Zero Trust Architecture in Government

Lookout was featured in the Zero Trust in Government Guide, published by Trezza Media Group in 2021 On the Frontlines Magazine. Learn more today.

A Guide for Agencies To Address Cybersecurity Exec. Order

Embark on the Zero Trust Path for Government. Lookout security experts have put together this eBook to help guide you through your Zero Trust journey.

Telework Exposed to Heightened Mobile Risk

Lookout data reveals that U.S. government organizations are exposed to hundreds of vulnerabilities from outdated operating systems and risky apps which steal credentials.

Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

Lookout data reveals that U.S. government organizations are increasingly targeted by credential stealing mobile attacks and exposed to hundreds of vulnerabilities.

Guilty Until Proven Innocent – Playing by Zero Trust Laws

Learn how Tyler Cohen Wood helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats

3 Key Considerations: Maintain Agency Cybersecurity in the BYOD Era

As agencies begin to contemplate the possibility of a more permanent telework culture, how can government successfully secure remote employees for the long-term?

New Guidance for Mobile Security

Hear from US federal CISO's on why they're adopting new guidance from NIST on how to best secure mobile users, particularly those working with sensitive government data.

Securing Telework From 2020 and Beyond

As public and private industries shift to telework, thanks to long-term innovation and short-term necessity, it’s clear that telework is here to stay. But to what scale?

Putting the “Trust” in Zero Trust: Post-Perimeter Security for Government

As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Zero Trust for mobile. Learn more in this whitepaper.

How Federal Agencies Can Revamp Their Mobile Security

Watch the full interview with Tony D’Angelo and learn more about re-prioritizing mobile device security to establish a more secure network security posture.

Enabling the U.S. Government To Achieve Zero Trust

In today’s environment, security teams cannot trust users that attempt to connect to their network, applications and data, even after they have authenticated.

Enabling the U.S. Government To Achieve Zero Trust

In today’s environment, security teams cannot trust users that attempt to connect to their network, applications and data, even after they have authenticated.

How Federal Agencies Balance Security and Mobility

A guide for agencies to address the cybersecurity executive order. Learn how top federal agencies manage secure telework with mobile security.

U.S. Federal Mobile Threats

Lookout analyzed its mobile security data to provide a view into the current mobile security risks facing US Federal government mobile users.

Addressing Threats to U.S. Critical Infrastructure

Nextgov editor James Hanson recently sat down with Aaron Cockerill for a virtual conversation shaped by today’s topics of critical infrastructure and cybersecurity threats.

Modernizing Government Cybersecurity With Zero Trust

Learn about the commitment Lookout has made to keeping federal, state and local agencies secure through our platform, providing enhanced coverage from endpoint to cloud.

Kiersten Todt on Securing the Public Sector

In this episode, we’re joined by Kiersten Todt, Executive Director of the Presidential Commission on Enhancing National Security to discuss top cybersecurity challenges

US Armed Services Goes BYOD

Watch this video to find out how Avid Systems uses Lookout to enable military personnel to securely use their personal devices for work.

Federal Systems Integrator Secures Against Mobile Phishing

“Lookout enables people to work the way they want on their phones,” says security architect.

Post-Perimeter Security for Government

See surprising mobile device trends among federal employees and learn how to implement post-perimeter security at your organization.

Post-Perimeter Security for Field Agents

Survey reveals phishing attacks targeting remote government field agents on mobile devices.

Lookout for Government Field Agents

Systems accessed remotely by agents contain sensitive government data, which could be used to compromise the financial well-being, privacy, and identity of US citizens.

FNR Interview: Mobile Bans and Use Cases

Mobile phone bans are not the answer. Learn what is.

FNR Interview: Mobile Threats and Policies

See what federal government agencies are up against today and how they’re responding.

Lookout for Federal Agencies

Get the latest guidelines related to securing mobility and how Lookout helps Federal agencies stay compliant with these new guidelines.