Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Post-perimeter security 101: Dawn of a borderless world

The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations to enforce their endpoints and establish continuous conditional access to data based on risk. Aaron Cockerill, Chief Strategy Officer at Lookout discusses how to effectively shift security to your mobile endpoints to protect your company’s sensitive data.

A Non-Partisan Threat: Cybersecurity and its Impact on Democracy

As part of Cybersecurity Awareness Month, Lookout held a special briefing sponsored by Rep. Ted Lieu and Rep. Jim Longevin, that focused on how cybersecurity attacks can impact the entire democratic process -- from political campaigns and elections to journalists, lobbyists and activists that participate in the process. The session included a live demo of how a cyberattack could happen on a mobile device.

Cybersecurity Predictions: Your phone matters more than your password

The password may be one of the worst security elements we have. They are oftentimes easily guessed because we, as humans, are generally pretty bad at creating and remembering them. So, we use weak passwords across multiple accounts. We use simple passwords like “123456” or “password.” The industry is also yet to find something better. The phone, however, presents new and exciting ways for companies to protect their accounts, which means the phone is also become a critical part of the hacker “kill chain.”

Cybersecurity Predictions: The Network Perimeter Will Be Reborn

The future of cybersecurity includes a major change to enterprise network perimeters. They are going to be reshaped into something new — micro-perimeters. This is the act of cordoning-off entire sections of systems in order to avoid major compromise when only one segment of the architecture is weak.

Cybersecurity Predictions: Effectiveness is measured by risk reduction

In the past, security technology wasn’t as regularly tested in the “real world” as it is today. That is, breaches are happening and being publicized at a far higher rate than ever before. There are seemingly multiple breaches a week. This means the security technology behind those breaches may get 15 minutes of undesired fame and the CSO gets a meeting with her boss. Going forward, security vendors will need to answer the question, “Does this security technology work?” Security stakeholders within an enterprise will answer the question, “Does this security technology work for me?”