| Executives

For CIOs, CISOs, technology professionals, and business leaders

View Articles arrow_forward

| Researchers

For security researchers and others in the InfoSec community

View Articles arrow_forward

| Individuals

For anyone interested in protecting their personal device and data

View Articles arrow_forward

Top Stories

| Executives
July 12, 2017

Lookout and Google to give talk on Pegasus at Black Hat USA 2017

The two talks at Black Hat and Bsides enterprise security professionals need to see.

View Article arrow_forward

| Executives
July 13, 2017

Data compromise via mobile threats: Enterprises are facing complex attacks

Mobile threats are more complex than a piece of malware in a third-party app store. In this blog post we dissect the “threats” component of the Mobile Risk Matrix.

View Article arrow_forward

Latest Blogs


| Individuals
July 19, 2017
Data breaches 2017: Only 6 months in and over 1.7B compromised accounts

We take a look back at the first six months of data breaches in 2017.

Read Morearrow_forward



| Executives
July 14, 2017
Gartner Security and Risk Management Summit: Incorporate mobile threat defense into your 90-day plan

At this year's Gartner Security and Risk Management Summit, we saw Gartner focus in on mobile security, specifically mobile threat defense,...

Read Morearrow_forward


eBook: The Practical Guide to Enterprise Mobile Security

Get all of your questions about enterprise mobile security, threats, and solutions answered in this essential guide.

Learn Morecall_made


| Executives
July 13, 2017
Data compromise via mobile threats: Enterprises are facing complex attacks

Mobile threats are more complex than a piece of malware in a third-party app store. In this blog post we dissect the “threats” component of the...

Read Morearrow_forward



| Executives
July 12, 2017
Lookout and Google to give talk on Pegasus at Black Hat USA 2017

The two talks at Black Hat and Bsides enterprise security professionals need to see.

Read Morearrow_forward



| Executives
July 10, 2017
Q&A with Bob Stevens: Where federal agencies are putting their dollars in mobile security

Lookout VP of Federal Bob Stevens disusses how the Spectrum of Mobile Risk impacts government agencies and organizations.

Read Morearrow_forward



| Executives
June 12, 2017
The 4 must-see sessions at this year’s Gartner Summit

This year, mobile security plays a noteworthy role at the summit, with four key conversations happening from an overall look at the state of mobile security to mobile security strategies, to mobile threat defense technologies.

Read Morearrow_forward



| Executives
June 8, 2017
Announcing our new Chief Development Officer: Vijaya Kaza

Vijaya Kaza has joined Lookout as Chief Development Officer. Vijaya sat down for a conversation about her experience developing security technology...

Read Morearrow_forward



| Individuals
June 5, 2017
Household brands breached in May including TripAdvisor, Brooks Brothers, and Docusign

In May, multiple well-known name brand companies were breached, including electronic signature company DocuSign, education technology company Edmodo, travel website TripAdvisor, publishing giant Gannett, and luxury men’s clothing retailer Brooks...

Read Morearrow_forward



| Executives
May 26, 2017
Understanding data leakage from mobile app behaviors & configurations

When many enterprises consider threats to their data via apps on a mobile device, they rightfully think of malware. However, there are many less...

Read Morearrow_forward



| Executives
May 25, 2017
EMM with unified MTD + MARS is the best practice for mobile security: insight from Gartner

The key insight for CISOs now is twofold: 1. That a unified “MTD + MARS” solution is a must-have, and 2. Enterprises must be able to set and enforce policies in both the MTD and MARS components, with congruent response and remediation.

Read Morearrow_forward