Webinar 34 min video Executive Impersonation and Smishing Attacks Why Does My CEO Want My Password? Cybercriminals are impersonating senior executives and IT teams to trick employees into sharing critical sensitive information and corporate credentials. Watch Video
Webinar 29 min video Goodbye VPN, Hello ZTNA: Secure Your Organization with Zero Trust Designed for traditional network architectures, VPNs are an outdated solution that no longer meet the security needs of today’s remote, multi-cloud environments. They are difficult to scale, complex Watch Video
Video 2 min video Lookout Mobile Endpoint Security (MES): Smishing and Executive Impersonation Protection This video illustrates how an organization can utilize the new Smishing and Executive Impersonation Protection features to add another layer to the “defense in depth” strategy required to protect the Watch Video
Video 32 min video Turning the Tables on Adversaries: Enhance Your SOC Playbooks With Mobile Threat actors are constantly evolving their tactics to stay a step ahead of your data security strategies. The latest trend is to target mobile devices to compromise employee identities, quietly your Watch Video
Video 5 min video The Hidden Dangers: A Guide for Government on Mobile Security Threats Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise, with hackers often using mobile devices as a backdoor into the agency’s Watch Video
Webinar 45 min video Interactive Workshop: Hunt for Threats with Lookout’s Industry-Leading Researchers Threat hunting is evolving as more adversaries use coordinated cross-platform attacks to infiltrate enterprise and government organizations. Now more than ever, security teams must understand how to Watch Video
White Paper How to Build an Effective Data Security Strategy: Five Steps Towards Full Visibility and Control Across Your Organization Read White Paper