David Richardson

Vice President, Product




David Richardson has been building software to help individuals and enterprises secure mobile devices for over a decade. David currently oversees product management at Lookout. He has 45 patents issued related to mobile security. He is a frequent speaker at security conferences on the topic of iOS and Android security.

David Richardson's posts


| Executives
September 15, 2020
Back to school? Secure your Chromebooks!

Chromebooks have become an essential tool for schools that transitioned to distance learning in the spring. These devices are a cost-effective way...

Read Morearrow_forward



| Executives
September 3, 2020
Why the IDC MarketScape named Lookout a mobile threat management software leader three years in a row

The IDC MarketScape for Mobile Threat Management Software just named Lookout a leader for the third consecutive year. Everyone at Lookout works hard...

Read Morearrow_forward



| Executives
July 14, 2020
Vulnerability management is too complicated without a data-driven approach

One of the most important actions you can take to keep your smartphones and tablets secure is to make sure their apps and operating systems are up to...

Read Morearrow_forward



| Executives
March 17, 2020
How to pragmatically embrace mobility in response to a remote workforce

The Coronavirus has impacted businesses and employees in a myriad of ways, and one common thread is the sudden need for employees to work remotely....

Read Morearrow_forward



| Executives
December 11, 2019
Five ways the security landscape will shift in 2020

2019 was another eventful year in the security space, with hackers targeting government agencies and corporations alike -- from the U.S. Customs and...

Read Morearrow_forward



| Executives
May 25, 2016
5 active mobile threats spoofing enterprise apps

Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments everywhere.

Read Morearrow_forward



| Executives
April 21, 2016
Using spoofed Wi-Fi to attack mobile devices

Millions of people around the world connect to public Wi-Fi networks on their mobile devices as they travel and seek their regularly scheduled Internet. The problem is, not all networks are official.

Read Morearrow_forward



| Executives
April 21, 2016
How we were able to spy on a 60 Minutes reporter

Malicious applications represent one of the main ways mobile devices are able to be compromised. We demonstrated an example of what can happen if a malicious app infects a mobile device on 60 Minutes.

Read Morearrow_forward



| Researchers
September 21, 2015
Updated: XcodeGhost iOS malware: The list of affected apps and what you should do

Researchers recently found a piece of iOS malware called XcodeGhost in a number of apps in the Apple App Store. The creator(s) of XcodeGhost were able to sneak the malicious code into these apps without the app developers’ knowledge. These...

Read Morearrow_forward



| Executives
September 10, 2015
Change to sideloading apps in iOS 9 is a security win

Among the many new features in iOS 9, Apple introduced a critical adjustment enterprises should note: a change in sideloading applications that we think is a serious win for security. Sideloading is the act of downloading an app to a device, in this...

Read Morearrow_forward