Video 47 min video Exclusive Briefing: Discovery, disclosure, and impact of an Android vulnerability We’d like to invite you to an opportunity to learn from a longtime Lookout customer, Alan Zaccardelle, who recently discovered an Android vulnerability, which he reported to Google and they are going Watch Video
Webinar 34 min video The SOC’s Biggest Blind Spot and the Risk it Poses Mobile devices have evolved into the cornerstone of employee productivity, communication and identity. However, they remain a blind spot for security teams and are a natural target for any threat to Watch Video
Report 1 min read Mobile Threat Landscape Report: Q3 2024 Lookouts Q3 Mobile Threat Landscape Report View Report Read Report
Webinar 2025 Security Planning: How to Utilize Mobile Threat Intelligence to Protect Cloud Data Read Webinar
Webinar 34 min video Executive Impersonation and Smishing Attacks Why Does My CEO Want My Password? Cybercriminals are impersonating senior executives and IT teams to trick employees into sharing critical sensitive information and corporate credentials. Watch Video
Video 2 min video Lookout Mobile Endpoint Security (MES): Smishing and Executive Impersonation Protection This video illustrates how an organization can utilize the new Smishing and Executive Impersonation Protection features to add another layer to the “defense in depth” strategy required to protect the Watch Video
Video 5 min video The Hidden Dangers: A Guide for Government on Mobile Security Threats Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise, with hackers often using mobile devices as a backdoor into the agency’s Watch Video
Webinar 45 min video Interactive Workshop: Hunt for Threats with Lookout’s Industry-Leading Researchers Threat hunting is evolving as more adversaries use coordinated cross-platform attacks to infiltrate enterprise and government organizations. Now more than ever, security teams must understand how to Watch Video
Content Mobile Endpoint Security Dashboard Scalable, unified platform to protect managed or unmanaged iOS, Android, and ChromeOS devices. Read Content
Survey Results Lookout Survey Reveals Critical Gaps in Mobile Endpoint Protection That Could Compromise Sensitive Corporate Cloud Data Read Survey Results
Sample Report Gain Unparalleled Insight Into Mobile Threats With Our Threat Advisory Report Read Sample Report
Webinar 39 min video The Modern Kill Chain: How Attacks Have Gone From Months to Minutes Cloud breaches are now happening in minutes, not months. Threat actors are exploiting the fact that mobile devices are more susceptible to social engineering, enabling them to gain direct access to - Watch Video
Webinar 59 min video Mobile Security: A Requirement for National Security Hear insights from Lookout and US Department of Justice on how mobile devices have become prime targets for cyberattacks, posing risks beyond just device use. Watch Video