| Executives

For CIOs, CISOs, technology professionals, and business leaders

View Articles arrow_forward

| Researchers

For security researchers and others in the InfoSec community

View Articles arrow_forward

| Individuals

For anyone interested in protecting their personal device and data

View Articles arrow_forward

| Executives
October 30, 2018

Putting the trust in zero trust: Post-perimeter security for a new age of work

Security must move to the endpoint because devices can no longer be trusted. Enterprises need a new security architecture called post-perimeter security.

View Article arrow_forward

| Researchers
August 22, 2018

Lookout discovers phishing site targeting DNC

As reported by The Washington Post and CNN today, Lookout has discovered a customer phishing kit targeted at the Democratic National Committee (DNC) via a third-party technology provider NGP VAN.

View Article arrow_forward

Latest Blogs


| Executives
April 15, 2019
Lookout partners with Trustonic to bring enhanced mobile security to payment and banking applications

Lookout Application Defense and Trustonic Trusted Execution Environment provides customers with protection from cyberthreats targeting banking,...

Read Morearrow_forward



| Researchers
April 9, 2019
Commercial spyware has a new name: stalkerware

Stories about surveillance tools like Pegasus and Dark Caracal’s Pallas are memorable because they tell the story of a severe privacy threat with...

Read Morearrow_forward


logo

See why Lookout is positioned as a Leader in the IDC MarketScape for the Mobile Threat Management security software market for the second year in a row.

Learn More


| Researchers
April 8, 2019
Lookout discovers phishing sites distributing new iOS and Android surveillanceware

For the past year, Lookout researchers have been tracking Android and iOS surveillanceware, that can exfiltrate contacts, audio recordings, photos,...

Read Morearrow_forward



| Executives
April 4, 2019
What is Lookout Continuous Conditional Access?

To create trust for devices in a post-perimeter world, Lookout Continuous Conditional Access works behind the scenes, dynamically monitoring the...

Read Morearrow_forward



| Executives
March 19, 2019
Tackling the hot topics of securing the post-perimeter world

Lookout is kicking off a thought leadership series in April, Securing the Post-Perimeter World: An Industry Forum. This will be the first of several...

Read Morearrow_forward



| Executives
March 11, 2019
Lookout collaborates with DXC Technology to advance a post-perimeter security architecture

In order tosupport and secure the ever-evolving workplace, DXC Technology is introducing DXC MobileThreat Defense, combining forces with Lookout, the...

Read Morearrow_forward



| Executives
March 5, 2019
Lookout mobile dataset provides Verizon with key insights for Verizon Mobile Security Index 2019

By leveraging our mobile dataset, the world’s largest, Lookout provided insights on mobile threats for the Verizon Mobile Security Index 2019 report.

Read Morearrow_forward



| Executives
February 28, 2019
Lookout announces Post-Perimeter Security Alliance

The Post-Perimeter Security Alliance includes leading enterprise vendors with a common vision to provide security and productivity for the modern,...

Read Morearrow_forward



| Researchers
January 28, 2019
What is Lookout Phishing AI?

Lookout Phishing AI continuously scans the Internet looking for malicious websites. Phishing AI detects the early signals of phishing, protects end...

Read Morearrow_forward



| Researchers
January 18, 2019
An inside look at nation-state cyber surveillance programs

On Saturday, January 19, Lookout researchers presented on their latest investigation into nation-state surveillance programs during a session called,...

Read Morearrow_forward