| Executives

For CIOs, CISOs, technology professionals, and business leaders

View Articles arrow_forward

| Researchers

For security researchers and others in the InfoSec community

View Articles arrow_forward

| Individuals

For anyone interested in protecting their personal device and data

View Articles arrow_forward

Top Stories

Enterprises often overlook mobile security risks because they are focused on seemingly low encounter rates for specific threats in the wild. Unfortunately, those encounter rates underestimate the true risk.

View Article arrow_forward
| Executives
July 14, 2017

Gartner Security and Risk Management Summit: Incorporate mobile threat defense into your 90-day plan

At this year's Gartner Security and Risk Management Summit, we saw Gartner focus in on mobile security, specifically mobile threat defense, highlighting the more urgent need for comprehensive...

View Article arrow_forward

| Individuals
July 27, 2017

New feature: Lookout Personal protects you from network attacks with Safe Wi-Fi

Lookout is excited to announce Safe Wi-Fi, a new feature for Lookout Premium customers that keeps anyone with the app safe from network-based attacks.

View Article arrow_forward

Latest Blogs


| Executives
December 11, 2017
Why government should embrace personal technology, not ban it

The recognition that mobile devices are insecure is a step in the right direction, but I have to wonder, is a ban the answer?

Read Morearrow_forward



| Executives
November 29, 2017
The evolving mobile threat landscape

Failure to properly secure the mobile device, however, could result in data loss, significant infringement fines, and brand reputation damage. Unfortunately, it's fairly common for employee to use a smartphone at work that has access to vital...

Read Morearrow_forward


See why Lookout is positioned as a Leader in the IDC MarketScape for the Mobile Threat Management security software market.

Learn Morecall_made


| Researchers
November 16, 2017
Tropic Trooper goes mobile with Titan surveillanceware

Learn about Titan, a family of sophisticated Android surveillanceware apps surfaced by Lookout's automated analysis that, based on command and control infrastructure, is linked to the same actors behind Operation Tropic Trooper.

Read Morearrow_forward



| Executives
November 14, 2017
Why your GDPR compliance strategy must include mobile

When considering compliance, enterprises must put mobile devices on even footing with desktops. This is especially true as we race toward May 2018, when the General Data Privacy Regulation (GDPR) takes effect.

Read Morearrow_forward



| Executives
November 8, 2017
Lookout to offer Microsoft Windows Defender ATP customers a comprehensive mobile security integration

Today, we are excited to announce the upcoming integration of Lookout Mobile Endpoint Security with Microsoft's Windows Defender Advanced Threat Protection (WDATP).

Read Morearrow_forward



| Individuals
November 8, 2017
Yahoo’s 2013 breach proves you should be tracking data breaches

This Yahoo data breach story shows the great difficulty both companies and the public face in understanding the full scope of a breach.

Read Morearrow_forward



| Executives
October 30, 2017
Lookout positioned as a Leader in new IDC MarketScape for Mobile Threat Management

This is the first IDC MarketScape for Mobile Threat Management, indicating that the market is growing and enterprises are more rapidly adopting these solutions. The IDC MarketScape recognizes that Lookout is a Leader in this maturing segment of...

Read Morearrow_forward



| Researchers
October 20, 2017
JadeRAT mobile surveillanceware spikes in espionage activity

Lookout researchers are monitoring the evolution of an Android surveillanceware family known as JadeRAT, we believe may be connected to a government...

Read Morearrow_forward



| Executives
October 18, 2017
Cloud computing in cybersecurity: Leveling the battlefield

If you're tired of hearing about cloud computing and big data, you might want to unplug and take a break from technology news the next few years.

Read Morearrow_forward



| Executives
October 17, 2017
Mobile vulnerabilities: What they are and how they impact the enterprise

CISOs understand that vulnerabilities in networks and other internal systems can be a major security threat, and that protecting against these should...

Read Morearrow_forward