Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2022

CASB Solution

A cloud access security broker (CASB), is cloud-delivered software or on-premises software and/or hardware that acts as an intermediary between users and cloud service providers. The ability of CASBs to address gaps in security extends across software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS) environments. In addition to providing visibility, a CASB also allows organizations to extend the reach of security policies from their existing on-premises infrastructure to the cloud and create new policies for cloud-specific contexts.

Interview with a Hacker How are Attackers Targeting Mobile Devices

Every organization today utilizes mobile as a productivity tool by providing a full range of access to corporate resources for iOS and Android devices. With employees accessing O365, G Suite, Salesforce, and other services where attackers see an opportunity. Join Lookout and Eurofins to learn from the hacker's perspective.

Critical Capabilities for Mobile Vulnerability Management

As organizations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive. Allowing employees to work productively from any device and any location can open users to the risks that come with the shared nature of a mobile device. When your employees work from a personal device with access to corporate data, the device's health must be taken into account. It must be assessed for compliance with corporate security and risk policies.

White Box Cryptography- Everything You Need to Know

In the world of heinous and sophisticated crimes, cryptography is the next-gen solution needed to resolve the concern. Whitebox cryptography combines encryption and obfuscation methods to embed secret keys in application code. The aim is to combine code and key in such a way that an attacker cannot distinguish between the two and the new "white-box" program can be safely executed in an insecure environment.

Microsoft Integration for a secure mobile workforce

The demand for secure remote worker solutions has dramatically grown and corporations are trying to provide secure access to business data while preserving user privacy on their personal devices. Leveraging the new Microsoft Endpoint Manager App Protection with Lookout capability, organizations can provide secure access to O365 and Teams apps, related data, and user credentials from a user’s personal mobile devices.

Where does mobile fit into security frameworks

Hear how mobile fits into guidance provided by organizations like NIST and CIS, how that affects compliance and security policies, and why it should matter to organizations everywhere. Join Tim Lemaster and Hank Schless as they chat about this and answered questions about how smartphones and tablets fit into your security strategy.

Steps to Stay Ahead of Risks and Protect Data Privacy

Technology has advanced our world in countless ways. Every day we bank, shop, conduct business and exchange photos and messages with family and friends online. While digital devices and services offer great convenience, they also pose risks to our data and privacy as the separation between our offline and online lives converges. Data Privacy Week, spanning January 24-28, serves as an important reminder of the importance of protecting our privacy and safeguarding personal information.

Sponsored Post

Under the Sheets, Practical Android Static Analysis

First off, before we get into the technical details of attacking applications, a few housekeeping bits must be understood. This blog is aimed at technical individuals that already understand at a basic level Android development and architecture, aiming to give security testers and application developers an insight into the ways an attacker may interrogate code to achieve some form of compromise.

How to threat hunt with mobile EDR

The Lookout Security Platform includes threat hunting capabilities as part of its mobile endpoint detection and response (EDR) solution. Watch Lookout security researcher Apurva Kumar walk through how she uses the Lookout console to investigate a security incident. Learn more about how you can secure your organization with EDR here: lookout.com/products/detection-and-response

Modernizing Government Cybersecurity with Zero Trust

Lookout CEO, Jim Dolce delivered a keynote address at the recent CyberTalks conference. In a time of disruption and uncertainty, cyberattacks have been on the rise and an Executive Order was issued requiring agencies to have a plan for Zero Trust. Learn how agencies can get started on this journey, securing apps, data, and resources, regardless of where they reside. This on-demand video recap provides guidance on how to stay ahead of the complex threat landscape posed by nation-states and other adversaries.

How a Large Financial Services Firm Protects Against Data Leakage with Lookout Secure Email Gateway

Regardless of the industry or organization, corporate email is the main cause of unauthorized and accidental data leaks. Employees are constantly sending emails to external parties that may contain sensitive company data, personally identifiable information (PII), trade secrets and other intellectual property.

Key Criteria for Choosing Mobile App Security Solution Vendor

Mobile phone apps are more popular than ever with a rapidly expanding user base each year. They have literally made everything come to the fingertips of the users and there’s a significant demand for mobile apps for just about everything, generating great competition and pressure among app developers around the world.

Getting the best out of Samsung Knox management with Mobile Device Manager Plus

In case you missed it, Samsung Knox has verified Mobile Device Manager Plus as a Knox Validated Partner solution. This means that our EMM solution meets its business-level requirements for 2022, and that we support a wide range of features to help you get the best out of all your mobile devices that support Samsung Knox capabilities.

Mobile malware will become (even more of) a business

Going into 2021, we predicted that mobile malware would become (even more of) a business. Christoph Hebeisen, Director of Security Intelligence Research talks about what we predicted correctly and what surprised us. Financially motivated cybercrime is quietly becoming more sophisticated and insidious, and mobile malware is now used by a variety of actors – including organized crime. We’ve seen the gradual commercialization of threats such as adware, toll fraud apps, banking trojans, and spyware.

Appknox Research reveals 91% of Fintech Apps Fail Basic Security Tests

The unexpected and rapid switch from the global workforce to the WFH setup caused by the coronavirus pandemic has prompted companies around the world to make extensive infrastructure adjustments to support employees working exclusively from home. According to the new IDC forecast, the number of mobile workers in the US will steadily increase from 78.5 million in 2020 to 93.5 million in 2024 over the next four years.

Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases

Enterprises know they need defenses integrated into each aspect of their network while not being an inhibitor to innovation. Digital transformation realized through new 5G-enabled IoT, Operational Technologies (OT) and IT use cases are no exception. Therefore, security teams need to take a closer look at the best technology to support this innovation.

Best Practices for Mobile App Security Testing for Developers & Non-Developers

Mobile application security testing (MAST) covers a wide range of topics, including authentication, authorization, data security, session management, and vulnerabilities for hacking. The mobile AST market is made up of buyers and sellers of products that identify vulnerabilities and apps used with mobile platforms during or post-development.

What to consider when assessing a CASB with Aaron Cockerill

All roads lead to Cloud Access Security Broker (CASB). Gartner found CASB to be the fastest-growing cyber security segment, with investment increasing by 41.2% (2021 CIO Agenda Survey). It's no surprise, as security teams turn to CASB to solve new cloud service-related challenges that legacy security solutions cannot address.