Aaron Cockerill
My Articles
Your Data Has Moved to the Cloud — Can Your Security Strategy Keep Up?
The modern workforce is characterized by the desire for flexibility, and your organization must adopt a new approach to security to match.
Insurance and Regulations May Be Biggest Security Drivers of 2023
Digital transformation trends have created complex corporate infrastructures, which is forcing the security industry to rethink how they protect data.
Persistence and Patience: Bad Qualities for Ransomware Attackers
To help you stay ahead of the ever-evolving ransomware threat, I connected with Microsoft Chief Security Advisor, Sarah Armstrong-Smith.
Zero Trust Requires Continuous Data and Endpoint Telemetry
By integrating our security and access platforms we are able to extend Lookout CCA and provide a modern approach to Zero Trust.
On-Prem or Cloud? Lessons from the Microsoft Exchange Attack
Organizations utilize on-premise software because they want full control. But it actually increases their risks.
Post-Perimeter Security | Zero Trust
Security must move to the endpoint because devices can no longer be trusted. Enterprises need a new security architecture called post-perimeter security.
Lookout Joins the VMware Workspace to Secure Enterprise Mobility
Lookout is proud to expand its alliance with VMware Workspace ONE as a member of the newly announced Trust Network.
Why Your GDPR Compliance Strategy Must Include Mobile
When considering compliance, enterprises must put mobile devices on even footing with desktops. This is especially true when the GDPR takes effect.
Understand Data Leaks From Mobile App Behaviors & Configurations
When many enterprises consider threats to their data via mobile apps, they rightfully think of malware. However, there are many less obvious ways that apps leak data.
Mobile Devices – Frequently a Part of Broader Cyber Attacks
Security professionals now say a mobile device was likely the root of a data breach in their organization, according to a survey conducted by the Ponemon Institute.
First iOS Malware Outbreak | How Many Devices Affected?
XcodeGhost is the latest example that iOS devices, indeed any device, can be subject to attack and that even a highly-curated app store can contain malicious apps.