Federal Government
Why Should Enterprises Care About APTs? Defend Against Chinese, Russian Cyber Espionage Hacking Groups and Other Nation-State Actors
APTs aren’t just the concerns of national governments. See why private enterprises need to pay attention to these threat actors and their campaigns.
NIST 800-124 Cybersecurity Publication Revision: How to Implement Mobile Security
NIST recently released a comprehensive document offering valuable insights and guidelines for implementing robust mobile endpoint security solutions.
Mitigating Cloud Supply-Chain Risk: Office 365 and Azure Exploited in Massive U.S Government Hack
According to SolarWinds filings with the SEC, the involved attackers were able to compromise the company’s Microsoft Office 365 emails with forged SAML tokens.
BYOD and Phishing Attacks: Top Threats Facing US Government
Lookout recently released our 2022 US Government Threat Report and we've picked out the main takeaways about the top threats currently facing U.S. government organizations.
Protecting Sensitive and Regulated Data in University and Government Healthcare Systems Requires a Unified Approach
To ensure that they are protected against intrusion, compromise, disruption and data exfiltration, hospital systems need to rethink the way they deploy cybersecurity.
Cybersecurity at the Tactical Level: The Importance of StateRAMP
Rather than tackle new security gaps in isolation, state and local governments need the resources and expertise of the federal government and the private sector.
Lookout and U.S. Govt. on New Vision for Zero Trust
We're excited that we have been selected by the National Institute of Standards and Technology (NIST) to collaborate on its Zero Trust architecture development efforts.
Four Steps to Modernizing Government Cybersecurity | Zero Trust
It is vital for agencies to understand the steps they can take right now to implement Zero Trust to safeguard against modern cyber attacks and comply with new regulations.
Mission Possible: Kiersten Todt on Securing the Public Sector
I recently had the pleasure of having Kiersten Todt, Managing Director of the Cybersecurity Readiness Institute, on the Endpoint Enigma podcast.
Top Three Threats Facing US Government Employees Amid Telework
All levels of government are increasingly exposed to credential-harvesting mobile attacks as well as risks from adware and outdated operating systems.
The Federal Office Has a New Look: Here’s How to Keep it Secure
To fully secure a telework environment, agencies need to tackle two objectives – mobile threat awareness and a comprehensive mobile endpoint security strategy.
Q&A: Michael Kaiser on State of Election Campaign Security
According to Tech for Campaigns, 90% of presidential campaigns’ 2018 digital campaign ad spend was delivered to mobile devices.
The Increasing Need for Mobile Security Among U.S. Federal Agencies
Employees are accessing sensitive data through their personal smartphones and tablets while they’re outside the protective perimeter of the office.
Protecting Government Agencies From Phishing Attacks
Lookout Phishing & Content Protection is designed to keep the public sector secure from phishing attacks in a mobile-first world. Learn more today.
The Government IT Problem: Your Security Perimeter Has Disappeared
Government work has changed. Critical data needed for employees to work has moved to the cloud and needs to be accessible from any device, wherever employees are.
Q&A: An Update on FISMA Mobility Metrics for Federal Agency Leaders
Victoria Mosby, Federal Sales Engineer for Lookout, shares insights and talks about what needs to be done to strengthen the government’s overall mobile security posture.
An Inside Look at Nation-State Cyber Surveillance Programs
Based on attacker communications found on a command and control server, this talk provides rare insight into a nation state’s $23 million surveillance program.
Texts and Their Impact on Election Campaign Security
Lookout recognized that mobile devices could influence the elections, so that is why we held a special briefing on Capitol Hill in early October.
Day of Shecurity: The Top Women in Federal Cybersecurity
Now is the time to change the status quo by advocating more women to consider cybersecurity as a possible career path.
Government Employees Being Human: How Mobile Behavior Impacts Security
The federal government has moved aggressively in recent years to put mobile technology into the hands of its workforce.
Mobile Security at the Center of Federal Internet of Things (IoT)
The "Internet of Things Cybersecurity Improvement Act of 2017," ensures that vendors selling IoT devices to the U.S. government meet certain cybersecurity standards.
Better Federal Mobile Security — An Interview With Kiersten Todt
Over the past decade, the federal government has followed the rest of society in a general move towards mobility.
Federal IT Change and the Leaders Making It Happen
2018 will bring the most change on the federal IT front in the past two decades, with the move to mobile being a major catalyst.
The Single Biggest Misconception in Government Security Today: Federal Agencies Aren’t Being Attacked on Mobile
Government agencies are being actively attacked on mobile, according to a new Lookout survey of 200 security and IT professionals.
Why Government Should Embrace Personal Technology, Not Ban It
The recognition that mobile devices are insecure is a step in the right direction, but I have to wonder, is a ban the answer?
Lookout & DHS Partnership | Best Mobile Security for Govt. Agencies
Today, DHS S&T announced it is partnering with Lookout to enhance the powerful Lookout Mobile Endpoint Security solution for government agencies.
Q&A With Bob Stevens: Where Federal Agencies Are Putting Their Dollars in Mobile Security
Lookout VP of Federal Bob Stevens disusses how the Spectrum of Mobile Risk impacts government agencies and organizations.
DHS Study Confirms Federal Agencies Need to Take Immediate Steps to Secure Mobility
This study on Mobile Device Security affirms that mobile security is critically important for our nation's cybersecurity.
5 Non-Negotiable Principles to Combat Cyber War on Mobile
Cyber war is a term the U.S. government is intimately familiar with, but woefully unprepared for when it comes to mobile.
Presidential Commission on Enhancing National Cybersecurity: Prioritize Mobile Security Now
The Presidential Commission on Enhancing National Cybersecurity saying; de-prioritizing mobile security is no longer an option.
Protect Your Agency's Data from Adversarial States and Governments
Learn from our security experts how to stop phishing attacks and restrict apps that communicate with foreign adversarial nation states.
5 Best Practices for Achieving Zero Trust
More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time.
Lookout | GovLoop Academy
This course, developed in collaboration with Lookout, explores the key risks of app security and highlights two tools that can help you assess and address those risks.
Guilty Until Proven Innocent – Playing by Zero Trust Laws
Learn how Tyler Cohen Wood helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats
New Guidance for Mobile Security
Hear from US federal CISO's on why they're adopting new guidance from NIST on how to best secure mobile users, particularly those working with sensitive government data.
Securing Telework From 2020 and Beyond
As public and private industries shift to telework, thanks to long-term innovation and short-term necessity, it’s clear that telework is here to stay. But to what scale?