March 24, 2016

How global enterprises are protecting themselves against mobile attack

For the next four weeks Lookout is diving into a number of key findings straight from the mouths of security and IT professionals you work with every day. This is week three. Check back for more insights from the field.

An employee’s access to confidential data on mobile devices has increased substantially over the past two years, say 74% of IT and security pros in a new report from the Ponemon Institute. In order to keep up, enterprises worldwide have had to adopt a number of tactics to ensure confidential data stays safe.

The relationship between mobile devices and data is widening. Employees are finding new tools to make their jobs easier, from SaaS products to being able to access email and documents on their commute home. Mobile devices offer a new way to work.

However, today only 36% of security and IT professionals at global companies say they are vigilantly protecting the sensitive corporate data employees access on their mobile devices.

These are the forward-thinkers in the industry who understand that mobile security is important not just to protect against threats, but because they know mobility is good for their workers.

Here’s are the most common mobile security features they have deployed:

Screen Shot 2016-03-24 at 11.39.48 AM

Read More

March 17, 2016

It’s 9am, do you know where your data is?

For the next four weeks Lookout is diving into a number of key findings straight from the mouths of security and IT professionals you work with every day. This is week two. Check back for more insights from the field.

There’s a disconnect between IT security departments and the employees they protect: IT often doesn’t know what kinds of data employees can access via their mobile devices.

Fifty-six percent of IT and security professionals believe people are only accessing texts and emails, according to a report from The Ponemon Institute. This perception paints the picture of employees who sit at their desks all day and every now and again check their phone for a message. Mobile devices, however, are being used for so much more, and the use cases are clear in the data:

Screen Shot 2016-03-17 at 4.42.04 PM

Read More

March 14, 2016

CeBIT 2016: What hacking cars has to do with your business

image2

This year at CeBIT, Lookout will be on the center stage, with Lookout’s CTO and co-founder, Kevin Mahaffey, sharing his talk, “Why I hacked Tesla and what it means for your business.” According to Mahaffey, what started as a car hack, turned into an investigation revealing many of the same challenges we see with traditional enterprise security. For example, how do you build a resilient and flexible perimeter in today’s mobile world? How do you get security updates systems working swiftly from day one?

Keynote: Thursday March 17th at 3:15 – 3:45 Hall 8, Center Stage

CeBIT is one of the largest IT trade events in the world, and is happening in Hannover Germany this week. At the event, we’ll be sharing news of our expansion into Germany, including many local partners and distributors. Check out the Lookout display at our partner, Mobile Iron’s booth (Hall 4, Stand A24). Please come visit it to say hello, or hallo.

If you can’t join the event in-person, you can also watch Kevin’s keynote from this live stream: http://webcast.nc3-cdn.com/clients/dmag/cgc2016/stage1/

March 10, 2016

Mobile devices — frequently a part of broader cyber attacks

For the next four weeks Lookout is diving into a number of key findings straight from the mouths of security and IT professionals you work with every day. This is week one. Check back for more insights from the field.

Security professionals now say a mobile device was likely the root of a data breach in their organization, according to a new survey of security experts conducted by the Ponemon Institute.

Mobility is as much about people as it is about devices. Today, mobile devices are productivity tools we use to plan construction projects on site, record patient data in a consultation, take orders, give presentations, send messages/emails, make phone calls, take photos, navigate in our cars, and so much more. It stands to reason, then, that these devices are becoming more engrained in the everyday working environment.

Since we give mobile devices access to some of our most sensitive information — work emails, budget documents, HR information, business plans. The number of “things” we consume through mobile is growing rapidly. By virtue of how our working habits have changed, and the comprehensive nature of the data accessible on these devices, IT and security professionals now acknowledge mobile devices are a legitimate vector for attack. In fact, 67 percent said their organization has likely suffered a data breach through mobile. Phishing attacks, spoofed Wi-Fi attacks, malicious applications, and more are the likely culprits.

Screen Shot 2016-02-22 at 5.42.10 PM

Read More

March 8, 2016

Lookout’s new Apple Watch app is your alarm when your iPhone leaves your side

AppleWatch_EN_ThreeScreens

Today we’re releasing a new app for the Apple Watch that gives wearers a real-time look at how far away they are from their iPhone. The app showcases something we call a “distance visualization bar” that effectively plays the “You’re getting warmer, you’re getting colder!” game with you and your iPhone. Before you move out of connection-range from your iPhone, the Lookout Apple Watch app will alert you that you’re about to go out of range and give you the option to make your iPhone emit a scream sound, or pull up a map of the iPhone’s location.

Read More

March 1, 2016

RSA 2016: Here are the sessions you need to see

IMG_5549 copy

It’s that time of year when a huge chunk of the security community descends on San Francisco like Ferry Building seagulls to a piece of Acme bread.

It’s RSA time, people.

We love a good security conference and are excited to give you practical security advice for running your day-to-day operations at the three sessions Lookout is leading at RSA. You won’t want to miss CTO and co-founder Kevin Mahaffey’s perhaps most intriguingly titled talk, “Giving the Bubble Boy and Immune System So He Can Play Outside”.

Two more useful sessions are being led by Mike Murray, VP of Security Research at Lookout. He’ll be presenting his own lessons learned from building secure products at GE, as well as a collaborative session on building a security RFP that helps you get the budget you’ve been fighting for.

Read More

February 26, 2016

Security Week-in-Review: Google’s fight against censorship

Screen Shot 2016-02-26 at 4.47.32 PM

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we talk about DDoS attacks, connected car vulnerabilities, and an exposed database of children’s records. Check back every Friday to learn about the latest in security news.

Read More

February 12, 2016

Security week-in-review: U.S.A. versus cyber threats

19142500254_cca5af69b7_z

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore President Obama’s new proposal to increase cybersecurity spending, a breach on the FBI, and the FCC commissioner’s comments on hacking cars. Check back every Friday to learn about the latest in security news.

Read More

February 12, 2016

Adversaries & ultrasound scanners: A Q&A with Lookout’s new VP of Security Research on his first day

mike-murrayWe’re thrilled to announce Michael Murray, a security industry research veteran, has joined Lookout to head up our Security Research and Response looking to focus on novel research and making the most out of our machine intelligence to knock out commodity and advanced/targeted malware.

Mike brings a huge wealth of security knowledge after serving as the director of product-development security at GE. Many of you already know Mike, but we wanted to give him a chance to talk about his plans in his own words:

Read More

February 10, 2016

Lookout commits to growth in Europe with new Netherlands office & partnerships

image

We’re pleased to announce the opening of Lookout’s Netherlands office, the company’s second in EMEA, serving as a hub for Lookout’s Northern Europe development.

The team is already having great success in the region, as led by Lookout EMEA’s Dutch native and former President of Intel Security EMEA, Gert-Jan Schenk. With a focus on building out business and securing local, strategic partnerships across the consumer and enterprise mobility and security space we’ve secured regional partners including the distributor Exclusive Networks along with channel partners BLAUD, Dahvo, Fondo, mITE Systems, and mobco.

The Netherlands is a key market for Lookout’s EMEA expansion. It’s is one of the most developed markets for mobile with a high density of mobile usage.

Read more in our press release here.