Video 21 min video The Human Factor: Don't Let Your Identity Become App-Rehended Catch Lookout's On-Demand Session from Black Hat 2025! Your digital identity is the crown jewel, and adversaries are bypassing traditional network and EDR defenses by weaponizing the human element. – Watch Video
Video 1 hr 1 min video Mobile Threat Intelligence Rethinking What Your Traditional EDR is Missing Watch Video
Video 1 hr 1 min video The Modern Endpoint - It’s Personal Today’s workforce isn’t tethered to laptops – it’s powered by mobile. It’s often a primary way many employees connect to email and other mission-critical resources but not treated that way from a to Watch Video
Video 58 min video Mobile Security The Human Layer is the New Attack Surface Phishing today isn't just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific and to Watch Video
Video 47 min video Exclusive Briefing: Discovery, disclosure, and impact of an Android vulnerability We’d like to invite you to an opportunity to learn from a longtime Lookout customer, Alan Zaccardelle, who recently discovered an Android vulnerability, which he reported to Google and they are going Watch Video
Webinar 34 min video The SOC’s Biggest Blind Spot and the Risk it Poses Mobile devices have evolved into the cornerstone of employee productivity, communication and identity. However, they remain a blind spot for security teams and are a natural target for any threat to Watch Video
Webinar 42 min video Cybersecurity Predictions: A Look into 2025's Security Landscape 2024 saw a surge in cyberattacks alongside rapid tech advancements, making it clear that staying ahead in the digital world is more important than ever. In this exclusive webinar, we’ll explore the — Watch Video
Webinar 29 min video Tracking APT41 with Mobile EDR APT41, a state-sponsored Chinese APT group active since 2012, targets both governments for espionage and private enterprises for financial gain. Indicted in 2019–2020, they compromised over 100 This Watch Video
Webinar 2025 Security Planning: How to Utilize Mobile Threat Intelligence to Protect Cloud Data Read Webinar
Report 1 min read Mobile Threat Landscape Report: Q3 2024 Lookouts Q3 Mobile Threat Landscape Report View Report Read Report
Webinar 34 min video Executive Impersonation and Smishing Attacks Why Does My CEO Want My Password? Cybercriminals are impersonating senior executives and IT teams to trick employees into sharing critical sensitive information and corporate credentials. Watch Video
Video 2 min video Lookout Mobile Endpoint Security (MES): Smishing and Executive Impersonation Protection This video illustrates how an organization can utilize the new Smishing and Executive Impersonation Protection features to add another layer to the “defense in depth” strategy required to protect the Watch Video
Video 32 min video Turning the Tables on Adversaries: Enhance Your SOC Playbooks With Mobile Threat actors are constantly evolving their tactics to stay a step ahead of your data security strategies. The latest trend is to target mobile devices to compromise employee identities, quietly your Watch Video