| Executives

For CIOs, CISOs, technology professionals, and business leaders

View Articles arrow_forward

| Researchers

For security researchers and others in the InfoSec community

View Articles arrow_forward

| Individuals

For anyone interested in protecting their personal device and data

View Articles arrow_forward

Latest Blogs


| Executives
May 14, 2019
PSD2 compliance is coming: do you have mobile app security for your payment apps?

The security requirements mandated by the Revised Payment Services Directive (PSD2) directive create the need for stronger authentication and secure...

Read Morearrow_forward



| Researchers
May 9, 2019
Mobile phishing protection: how to defend against https phishing attacks

Https phishing attacks may be common and hard to spot, but with Lookout deployed, enterprises have comprehensive mobile phishing protection --...

Read Morearrow_forward


logo

See why Lookout is positioned as a Leader in the IDC MarketScape for the Mobile Threat Management security software market for the second year in a row.

Learn More


| Executives
April 23, 2019
Helping higher education tackle today’s cybersecurity challenges

The perimeter has fully disappeared, and thankfully there are solutions that allow higher education institutions to safely and securely leverage...

Read Morearrow_forward



| Executives
April 15, 2019
Lookout partners with Trustonic to bring enhanced mobile security to payment and banking applications

Lookout Application Defense and Trustonic Trusted Execution Environment provides customers with protection from cyberthreats targeting banking,...

Read Morearrow_forward



| Researchers
April 9, 2019
Commercial spyware has a new name: stalkerware

Stories about surveillance tools like Pegasus and Dark Caracal’s Pallas are memorable because they tell the story of a severe privacy threat with...

Read Morearrow_forward



| Researchers
April 8, 2019
Lookout discovers phishing sites distributing new iOS and Android surveillanceware

For the past year, Lookout researchers have been tracking Android and iOS surveillanceware, that can exfiltrate contacts, audio recordings, photos,...

Read Morearrow_forward



| Executives
April 4, 2019
What is Lookout Continuous Conditional Access?

To create trust for devices in a post-perimeter world, Lookout Continuous Conditional Access works behind the scenes, dynamically monitoring the...

Read Morearrow_forward



| Researchers
April 1, 2019
Phishing AI discovers new mobile-first phishing campaign

Lookout Phishing AI reports a new, sophisticated phishing kit designed for mobile users targeting Verizon customers.

Read Morearrow_forward



| Executives
March 19, 2019
Tackling the hot topics of securing the post-perimeter world

Lookout is kicking off a thought leadership series in April, Securing the Post-Perimeter World: An Industry Forum. This will be the first of several...

Read Morearrow_forward



| Executives
March 11, 2019
Lookout collaborates with DXC Technology to advance a post-perimeter security architecture

In order tosupport and secure the ever-evolving workplace, DXC Technology is introducing DXC MobileThreat Defense, combining forces with Lookout, the...

Read Morearrow_forward