While DLP has been around for decades, it has reinvented itself in this remote-first environment. In this blog, I will discuss how modern DLP solutions, integrated into a cloud-delivered platform, can help organizations prevent data breaches, comply with regulations, while providing secure access to remote workers.
While most of us understand Zero Trust conceptually, the path to Zero Trust is a complex and constantly evolving journey. In this blog, I will break down what is and what isn’t Zero Trust.
We often associate breaches with corporate espionage and advanced threat groups, but this Pfizer IP leak exemplifies a rather mundane problem that has been amplified by cloud connectivity: data leakage.
In quick succession in December, The Apache Software Foundation released information on two critical vulnerabilities in its Log4j Java-based library.
Through my research I found that all levels of government are increasingly exposed to credential-harvesting mobile attacks as well as risks from adware and outdated operating systems.
The prolific adoption of all things cloud (IaaS, PaaS, and SaaS) continues to drive massive fragmentation in security strategies and tooling used to address these challenges, with many practitioners scrambling to find scalable solutions that maintain business continuity while enabling adequate protection.
The Lookout Threat Intelligence team has discovered two novel Android surveillanceware – Hornbill and SunBird. We believe with high confidence that these surveillance tools are used by the advanced persistent threat group (APT) Confucius, which first appeared in 2013 as a state-sponsored, pro-India actor primarily pursuing Pakistani and other South Asian targets.
The main theme I want to get across here is that data privacy is essential, especially as we continue to rely on our mobile devices for personal and...
At the end of the day, your legal staff is human and will therefore likely make mistakes. Proper training will go a long way to reduce the risk to which your firm is exposed, as will having the security in place.
Just as you’d have a key to lock up your valuable physical assets in a safe deposit box at a local bank, we’re offering the same for organizations with especially sensitive data. Lookout Cloud Key Security users can encrypt their sensitive data with encryption keys that are specific to their organization.
On December 17, CISA released an alert about an advanced persistent threat (APT) that compromised a number of U.S. government agencies, U.S. technology and accounting companies, and at least one hospital and one university.
Here are five predictions about how we anticipate individuals and organizations will be forced to confront the threats targeting their information, privacy and devices.
The Lookout Threat Intelligence team has discovered a new mobile app threat targeting iOS and Android users in Chinese speaking countries, Korea and Japan.
Cloud adoption has reached stratospheric levels, and with this increased volume of workloads and applications usage, organizations require tighter controls to protect their multi-cloud environments and data from potential data leaks or breaches due to misconfigurations. Enter Cloud Security Posture Management (CSPM).
Using QR code comes with risks. For starters, there is no way to tell where the code will direct you before scanning.
As the leader in mobile security, we decided to host a virtual summit to help security professionals around the world unpack the challenges related to this mobile reality. With our partners at The Cyber Security Hub, we had over 1,000 security professionals register to attend our “Security In Motion” virtual summit.
In our latest industry threat report, we found that 77 percent of mobile phishing attempts on pharmaceutical organizations through the third quarter of 2020 intended on delivering malware.
We’re extremely pleased to note that the Lookout CASB platform has successfully captured the title of “Visionary” from industry analysts Gartner in the 2020 iteration of its Magic Quadrant for Cloud Access Security Brokers.
To fully secure a telework environment, agencies need to tackle two objectives – mobile threat awareness and a comprehensive mobile endpoint security strategy.
In the world of data loss prevention (DLP),in particular, and related to the challenge of building and enforcing DLP policies that address today’s evolving cloud security requirements, the issue of policy effectiveness is similarly a critical aspect of ensuring overall success.
Verizon recently announced the launch of Business Mobile Secure, a full security solution designed specifically for small and medium business customers with Lookout mobile security at the helm of the bundle’s modern endpoint protection offerings.
Businesses are increasingly turning to mobility solutions to increase productivity. You need mobile EDR to provide visibility across all of your mobile endpoints that are now at the center of how your workers stay connected.
In case you missed it, Lookout just announced something that I’m super excited about – the introduction of threat hunting and research into the Lookout Security Platform. The reason this is so satisfying is because we are enabling organizations to use the same tools our security analysts have been using for years.
Together, Lookout Continuous Conditional Access and Google Cloud Identity protect your Google Workspaces from malicious threats delivered via mobile phishing scams, malicious apps, and device-level exploitations.
As campaign activities ramp up across the nation and governments ponder remote options for voting, mobile security has become imperative. And it’s not just in 2020 that we have to be concerned about election security. The role and importance of mobile devices in our democratic process will continue to increase into the future.
In the strictest sense, we’re all likely operating a shadow IT operation right now. As we continue to work from home, each of us is using networks that our IT teams have no control over.
The rapid uptake of game-changing SaaS applications has been transforming the way organizations do business long before the emergence of COVID-19 and the remote workforce exploded overnight. Today’s security practitioners need practical guidelines and technical capabilities that support their expanding SaaS usage.