Webinar 25 min video Exclusive Partner Briefing: Phishing for Financial Gain: UNC3944 What do 0ktapus, Scatter Swine, and Scattered Spider all have in common? Overlap with UNC3944 nexus who specializes in SMS phishing campaigns, SIM swap attacks, and good old fashioned social This has Watch Video
Webinar 1 hr 2 min video The State of Mobile Phishing in 2023: Why It’s Here To Stay Mobile phishing is arguably one of the most effective ways for attackers to steal employee login credentials. With legitimate usernames and passwords in hand, attackers can silently enter your move a Watch Video
Webinar 35 min video Data Protection Shouldn't Stop at IT: Why Everyone is on the Hook Is your data at risk? In the new hybrid world of work, data is in constant motion—moving between countless devices, apps, and users. Watch Video
Webinar 58 min video The Dangers of Advanced Persistent Threat (APT) Groups and What Enterprise Security Teams Need to Know Watch Video
Webinar 31 min video The Missing Piece In Your Data Protection Strategy: Mobile Devices Cloud migrations are taking place in every organization and industry, which is why your data is now accessible from any device — whether that’s a company laptop or a personal mobile device. As a no a Watch Video
Webinar 38 min video Cybersecurity Predictions for 2024: Emerging Threats and Best Practices As the digital age is constantly evolving, the cybersecurity landscape remains in a constant state of change. The year 2023 bore witness to a multitude of cyberattacks and technological advancements. Watch Video
Webinar 34 min video Mitigating the Risks of GenAI: Secure Your Data & Empower Your Workforce An estimated 56% of employees are directly using AI to automate or augment job tasks.* Although there are many benefits that come with using these tools — employee enablement, productivity, time and Watch Video
Video 5 min video How Lookout Protects Against the Modern Killchain Cybercriminals continue to evolve their tactics to compromise your organization's security defenses. The modern approach is to start by targeting users on their mobile devices to steal their Learn at Watch Video
Threat Intelligence 1 min read CryptoChameleon: New Phishing Tactics Exhibited in FCC-Targeted Attack Summary: Lookout recently discovered an advanced phishing kit exhibiting novel tactics to target cryptocurrency platforms as well as the Federal Communications Commission (FCC) via mobile devices. of Read Threat Intelligence
Feature Brief 7 min read Secure Internet Access Brief Lookout Secure Internet Access is a cloud-delivered secure web gateway (SWG) and Firewall as a Service (FWaaS) that is part of the data-centric Lookout Cloud Security Platform. Read Feature Brief
Feature Brief 7 min read Secure Private Access Brief Seamless and secure access to enterprise private apps and data Read Feature Brief
Case Study Global Smart Meter Manufacturer Secures Move to Microsoft Intune With Lookout Read Case Study
Case Study Logistics leader Simon Hegele secures mobile endpoints and establishes GDPR compliance on mobile Read Case Study
Feature Brief 7 min read Secure Cloud Access Brief Protect your cloud data with complete visibility and control Read Feature Brief