| Executives

For CIOs, CISOs, technology professionals, and business leaders

View Articles arrow_forward

| Researchers

For security researchers and others in the InfoSec community

View Articles arrow_forward

| Individuals

For anyone interested in protecting their personal device and data

View Articles arrow_forward

Latest Blogs


| Executives
June 10, 2021
Not All CASBs Are Created Equal. How Do You Choose?

But how do you choose the right CASB? This is an especially important purchase in this work-from-anywhere environment. Your employees are...

Read Morearrow_forward



| Executives
June 2, 2021
Lookout and Jamf: Defending Against Mobile Threats

I’m pleased to share that Jamf and Lookout have formed a partnership to integrate Jamf Pro with Lookout Mobile Endpoint Security. Jamf provides...

Read Morearrow_forward


logo

See why Lookout is positioned as a Leader in the IDC MarketScape for the Mobile Threat Management security software market for the third year in a row.

Learn More


| Executives
May 27, 2021
Code Blue: Healthcare Security in the Age of 5G and Remote Work

Why were hospitals so frequently breached by attacks? To answer that question, I turned to an old friend of Lookout — former CISO Mike Murray. Mike,...

Read Morearrow_forward



| Executives
May 25, 2021
Critical Mobile Security Capabilities Everyone Needs

Here’s the dilemma a lot of organizations are facing: while away from the office, your workers are using their mobile devices to stay productive. And...

Read Morearrow_forward



| Executives
May 17, 2021
3 actions to take based on the Colonial Pipeline ransomware attack

Attackers launched a ransomware attack against the Colonial Pipeline that demonstrated how cybercrime groups exploit diminishing visibility, legacy...

Read Morearrow_forward



| Executives
May 12, 2021
Safeguard Against Account Takeovers with Endpoint-to-cloud Security

What makes this a big issue isn’t just the account takeovers themselves, but also the lack of visibility. Your employees can now use whatever device...

Read Morearrow_forward



| Executives
May 6, 2021
Device management blind to 125 percent increase in financial sector phishing attacks

To better understand how the financial industry reacted to this digital shift, I took a deep dive into the tens of millions of device, app and...

Read Morearrow_forward



| Executives
May 4, 2021
Lookout Named Best Mobile Security Solution by the SC Awards

I’m pleased to share that Lookout Mobile Endpoint Security has achieved yet another leadership milestone by being named SC Awards’ Best Mobile...

Read Morearrow_forward



| Executives
April 27, 2021
FluBot: Malware as a Service Meets Mobile Phishing

This campaign is the latest example of how attacks are leveraging various mobile-targeting methods to maximize their return. FluBot is a cheap but...

Read Morearrow_forward



| Executives
April 22, 2021
Mission Possible: Kiersten Todt on Securing the Public Sector

I recently had the pleasure of having Kiersten Todt, Managing Director of the Cybersecurity Readiness Institute, on the Endpoint Enigma podcast.

Read Morearrow_forward


Find out how you can secure your smartphones and tablets today

Request A Demo call_made

Free Trial call_made

Contact Sales call_made