| Executives

For CIOs, CISOs, technology professionals, and business leaders

View Articles arrow_forward

| Researchers

For security researchers and others in the InfoSec community

View Articles arrow_forward

| Individuals

For anyone interested in protecting their personal device and data

View Articles arrow_forward

Top Stories

Enterprises often overlook mobile security risks because they are focused on seemingly low encounter rates for specific threats in the wild. Unfortunately, those encounter rates underestimate the true risk.

View Article arrow_forward
| Executives
July 14, 2017

Gartner Security and Risk Management Summit: Incorporate mobile threat defense into your 90-day plan

At this year's Gartner Security and Risk Management Summit, we saw Gartner focus in on mobile security, specifically mobile threat defense, highlighting the more urgent need for comprehensive...

View Article arrow_forward

| Individuals
July 27, 2017

New feature: Lookout Personal protects you from network attacks with Safe Wi-Fi

Lookout is excited to announce Safe Wi-Fi, a new feature for Lookout Premium customers that keeps anyone with the app safe from network-based attacks.

View Article arrow_forward

Latest Blogs


| Executives
October 18, 2017
Cloud computing in cybersecurity: Leveling the battlefield

If you're tired of hearing about cloud computing and big data, you might want to unplug and take a break from technology news the next few years.

Read Morearrow_forward



| Executives
October 17, 2017
Mobile vulnerabilities: What they are and how they impact the enterprise

CISOs understand that vulnerabilities in networks and other internal systems can be a major security threat, and that protecting against these should...

Read Morearrow_forward


See why Lookout is positioned as a Leader in the IDC MarketScape for the Mobile Threat Management security software market.

Learn Morecall_made


| Individuals
October 16, 2017
Going beyond the headlines: Why the Equifax breach really matters

Many of today's leading organizations, even those that handle the most sensitive data, are playing an ongoing game of catch-up on the global...

Read Morearrow_forward



| Executives
October 11, 2017
Machine Learning in cybersecurity: Cutting through the hype

Here’s a little insight into the fundamentals of ML to help you separate empty claims and buzzwords from real value creation when evaluating...

Read Morearrow_forward



| Researchers
October 5, 2017
FrozenCell: Multi-platform surveillance campaign against Palestinians

Lookout researchers have discovered a new mobile surveillanceware family, FrozenCell. The threat is likely targeting employees of various Palestinian...

Read Morearrow_forward



| Executives
September 11, 2017
2017​ ​Gartner​ ​Market​ ​Guide​ ​for​ ​Mobile​ ​Threat​ ​Defense:​ ​"The​ ​signs​ ​are​ ​clear​ ​that​ ​mobile threats​ ​can​ ​no​ ​longer​ ​be​ ​ignored.*"

The​ ​first​ ​sentence​ ​of​ ​this​ ​year's​ ​Gartner​ ​Market​ ​Guide​ ​for​ ​Mobile​ ​Threat​ ​Defense​ ​(MTD)​ ​delivers the​ ​report's​ ​bottom​...

Read Morearrow_forward



| Individuals
September 7, 2017
Anthem breach shows how personal data can leak in seconds

Anthem BlueCross BlueShield reported a breach impacting over 18,000 customers in August, further proving that breaches can be caused by a number of...

Read Morearrow_forward



| Executives
September 6, 2017
DHS and Lookout partner to build the best mobile security for government agencies

Today, DHS S&T announced it is partnering with Lookout to enhance the powerful Lookout Mobile Endpoint Security solution for government agencies.

Read Morearrow_forward



| Executives
September 1, 2017
Lookout is ISO 27001, FedRAMP In Progress, and Privacy Shield certified for secure data handling

When government agencies and multinational companies choose a security solution it's critical that they are able to trust those solutions to handle...

Read Morearrow_forward



| Researchers
August 31, 2017
Lookout discovers sophisticated xRAT malware tied to 2014 “Xsser / mRAT” surveillance campaign against Hong Kong protesters

Lookout researchers have identified a mobile trojan called xRAT with extensive data collection functionality and the ability to remotely run a...

Read Morearrow_forward