![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91a8c5_Gradient%20BK.webp)
Blog
Latest news, threat info, and security updates from the leaders in cloud security.
![Man in suit looking at smartphone in an modern office space.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/64cc2e50d19fe9c7e318b920_64ad8cecda5417d65d91d12c_63b63623e1719b0e176f54b9_63892bb30560ce6518769c66_6352ce3d458e0074a2a93aed_631b95f8bcd59ceb98ff5c91_cybersecurity-endpoint-detection-response.webp)
July 8, 2024
Cybersecurity Is Not Complete Without EDR for Mobile
Businesses are increasingly turning to mobility solutions to increase productivity. You need mobile EDR to provide visibility across all of your mobile endpoints.
June 24, 2024
What’s New With Lookout: Simplifying SSE
We are excited to announce the latest product release to the Lookout Cloud Security Platform, which builds upon the launch of our mid-market SSE offering earlier this year.
June 5, 2024
Three Questions to Ask About Your Cloud Security Posture
As your organization transforms its digital infrastructure, cybersecurity needs to go through the same transformation.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
#
results
#
filters applied
![Man in suit looking at smartphone in an modern office space.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/64cc2e50d19fe9c7e318b920_64ad8cecda5417d65d91d12c_63b63623e1719b0e176f54b9_63892bb30560ce6518769c66_6352ce3d458e0074a2a93aed_631b95f8bcd59ceb98ff5c91_cybersecurity-endpoint-detection-response.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
Cybersecurity Is Not Complete Without EDR for Mobile
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/668c0c34631d407ec681525e_social-engineering-attack-examples.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
9 Social Engineering Attack Examples to Watch Out For
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![A woman works at a laptop while sitting next to an office building window.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/667db289ab3128d079ebf27d_cloud-security-compliance.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
Cloud Security Compliance: Ensuring Data Safety in the Cloud
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![A green plant in the foreground with a computer monitor showing a meeting in the background.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/667db3bfd84f2f0c5f7554da_remote-work-security.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
Top Remote Work Security Risks Every Organization Should Know
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/667993df27922bae55b2e3bb_lookout-simplifying-sse.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
What’s New With Lookout: Simplifying SSE
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![A smartphone with displaying OpenAI's "About" page.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/6675ce99a999065334e44ae3_chatgpt-security.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
ChatGPT Security: Tips for Safe Interactions with Generative AI
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![Black woman having video chat on smartphone at home](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/6675cf83ddbcd5014dbee792_mobile-security-threats.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
7 Top Mobile Security Threats: Safeguard Your Device
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/6670900e1645b01ef8e1849b_mobile-phishing.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
The Rising Threat of Mobile Phishing and How to Avoid It
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/667090bca457bb52e665347b_cloud-security-strategy.webp)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
Crafting a Robust Cloud Security Strategy in 2024
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
![Man sitting at desk with three large computer monitors in front of him.](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a8b7/64cc2e5484100f8f5bcdf812_64ad8cecda5417d65d91d12a_63b636236e90d8654c78ee95_6344483b58882dd88cce6bbf_blog_cloud_security_posture_600x300.png)
![](https://cdn.prod.website-files.com/64ad8cecda5417d65d91a876/64ad8cecda5417d65d91aa09_blog-placeholder.webp)
Three Questions to Ask About Your Cloud Security Posture
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.