Lookout
Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves.
My Articles
CVE-2024-12053
CVE-2024-12053 highlights a Type Confusion in V8 vulnerability in Google Chrome
ZTNA and Microsegmentation: A Powerful Duo to Mitigate the Risk of Breaches
Mitigate the risk of a costly data breach by employing ZTNA and microsegmentation solutions for your network.
Achieving Secure Access: How to Implement Zero Trust for Remote Workers
Read this guide to learn how to implement zero trust for remote workers, including implementing least privilege access and integrating mobile devices.
Your Data Has Moved to the Cloud — Can Your Security Strategy Keep Up?
The modern workforce is characterized by the desire for flexibility, and your organization must adopt a new approach to security to match.
Insurance and Regulations May Be Biggest Security Drivers of 2023
Digital transformation trends have created complex corporate infrastructures, which is forcing the security industry to rethink how they protect data.
Zero Trust Requires Continuous Data and Endpoint Telemetry
By integrating our security and access platforms we are able to extend Lookout CCA and provide a modern approach to Zero Trust.
On-Prem or Cloud? Lessons from the Microsoft Exchange Attack
Organizations utilize on-premise software because they want full control. But it actually increases their risks.
Post-Perimeter Security | Zero Trust
Security must move to the endpoint because devices can no longer be trusted. Enterprises need a new security architecture called post-perimeter security.
Why Your GDPR Compliance Strategy Must Include Mobile
When considering compliance, enterprises must put mobile devices on even footing with desktops. This is especially true when the GDPR takes effect.
Mobile Devices – Frequently a Part of Broader Cyber Attacks
Security professionals now say a mobile device was likely the root of a data breach in their organization, according to a survey conducted by the Ponemon Institute.
First iOS Malware Outbreak | How Many Devices Affected?
XcodeGhost is the latest example that iOS devices, indeed any device, can be subject to attack and that even a highly-curated app store can contain malicious apps.