| Executives

For CIOs, CISOs, technology professionals, and business leaders

View Articles arrow_forward

| Researchers

For security researchers and others in the InfoSec community

View Articles arrow_forward

| Individuals

For anyone interested in protecting their personal device and data

View Articles arrow_forward

Latest Blogs


| Executives
July 7, 2020
Got MDM? Here are five reasons why you still need mobile security

MDM is a valuable component of an organization’s mobile strategy. But you also need mobile security to make sure your sensitive data is protected.

Read Morearrow_forward



| Researchers
July 1, 2020
Multiyear Surveillance Campaigns Discovered Targeting Uyghurs

The Lookout Threat Intelligence team has discovered four Android surveillanceware tools used as part of a much larger mAPT (mobile advanced...

Read Morearrow_forward


logo

See why Lookout is positioned as a Leader in the IDC MarketScape for the Mobile Threat Management security software market for the second year in a row.

Learn More


| Executives
June 23, 2020
The Increasing Need for Mobile Security Among U.S. Federal Agencies

The recent shift to telework has exposed something that has been happening for a while now – employees are accessing sensitive data through their...

Read Morearrow_forward



| Executives
June 16, 2020
Federal phishing encounter rates more than doubled in first quarter of 2020

From citizens’ personally identifiable information to sensitive national security data, the federal government has access to critical and highly...

Read Morearrow_forward



| Executives
June 9, 2020
Mobile phishing is spiking around the world

Here at Lookout, we often work with organizations on their cybersecurity needs depending on geographical or industry sector priorities. In recent...

Read Morearrow_forward



| Executives
June 2, 2020
Global mobile phishing encounters surged by 37% amid shift to work-from-home

In the newly released Mobile Phishing Spotlight Report, Lookout revealed that enterprise mobile phishing encounter rates surged 37% between the last...

Read Morearrow_forward



| Executives
May 26, 2020
The mobile risks beyond business email compromise

BEC may seem to be an email-related attack; email is even in its name. But at its root, BEC is a phishing attack. And with the rise of smartphones...

Read Morearrow_forward



| Executives
May 19, 2020
Achieving Unified Endpoint Security with Lookout and VMware Carbon Black

We are excited to announce that Lookout, Carbon Black and VMware have come together to deliver a Unified Endpoint Security (UES) solution. With this...

Read Morearrow_forward



| Executives
May 12, 2020
NIST Updates Its Mobile Security Guidelines: What’s Changed Since 2013

Since the National Institute of Standards and Technology (NIST) first released its enterprise mobile device security guidelines Special Publication...

Read Morearrow_forward



| Executives
May 6, 2020
The next normal is emerging

If there’s one thing the coronavirus pandemic has brought to light, it’s the essential role mobile technology plays in the world. As we look past the...

Read Morearrow_forward