Lookout
Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves.
My Articles
The Importance of Visibility and Control in SSE
Implement an SSE solution at your organization to gain visibility into potentially compromised accounts and control over your most sensitive data.
The Rise of Holiday Cyber Threats: What Organizations Need to Know
Learn how to protect your organization from cyber threats over the holidays.
5 Essential Holiday Cybersecurity Tips for Enterprises
Follow our holiday cybersecurity tips to mitigate year-end cyber threats. Help your staff recognize holiday scams and develop a data breach contingency plan.
Holiday Season Cyber Attack Patterns: How They Impact Enterprise Operations
Learn how cyber attackers target enterprise-level organizations during the holidays — and what proactive steps you can take to mitigate the threat.
Seasonal Phishing Scams: Protect Your Enterprise During the Holiday Spike
The holidays are a busy time for cyber attackers. Learn about common phishing scams and how to prevent them during this hectic season.
’Tis the Season: How to Strengthen Your Defenses Against Holiday Hacking
Holiday hacking can disrupt your business at its busiest. Read this guide to learn how MFA, EDR, and more can help keep holiday hackers out.
How to Prevent Hacking During the Holiday Season
Wondering how to prevent hacking during the busiest time of year? Read our guide to discover actionable tips that will help keep your infrastructure secure.
Achieving Secure Access: How to Implement Zero Trust for Remote Workers
Read this guide to learn how to implement zero trust for remote workers, including implementing least privilege access and integrating mobile devices.
ZTNA and Microsegmentation: A Powerful Duo to Mitigate the Risk of Breaches
Mitigate the risk of a costly data breach by employing ZTNA and microsegmentation solutions for your network.
Your Data Has Moved to the Cloud — Can Your Security Strategy Keep Up?
The modern workforce is characterized by the desire for flexibility, and your organization must adopt a new approach to security to match.
Insurance and Regulations May Be Biggest Security Drivers of 2023
Digital transformation trends have created complex corporate infrastructures, which is forcing the security industry to rethink how they protect data.
Zero Trust Requires Continuous Data and Endpoint Telemetry
By integrating our security and access platforms we are able to extend Lookout CCA and provide a modern approach to Zero Trust.
On-Prem or Cloud? Lessons from the Microsoft Exchange Attack
Organizations utilize on-premise software because they want full control. But it actually increases their risks.
Post-Perimeter Security | Zero Trust
Security must move to the endpoint because devices can no longer be trusted. Enterprises need a new security architecture called post-perimeter security.
Why Your GDPR Compliance Strategy Must Include Mobile
When considering compliance, enterprises must put mobile devices on even footing with desktops. This is especially true when the GDPR takes effect.
Mobile Devices – Frequently a Part of Broader Cyber Attacks
Security professionals now say a mobile device was likely the root of a data breach in their organization, according to a survey conducted by the Ponemon Institute.
First iOS Malware Outbreak | How Many Devices Affected?
XcodeGhost is the latest example that iOS devices, indeed any device, can be subject to attack and that even a highly-curated app store can contain malicious apps.