Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

lookout

Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise

The first steps for any organization in creating a data security strategy are accurately identifying all of their sensitive information and securing that data from unauthorized access, regardless of where it resides. This is why I’m excited to announce the integration of Titus and Boldon James, leading data classification systems from Fortra (formerly HelpSystems), with the Lookout security service edge (SSE) solution.

lookout

Lookout Discovers Hundreds of Predatory Loan Apps on Google Play and Apple App Store

Researchers at Lookout Threat Lab have discovered close to 300 mobile loan applications on Google Play and the Apple App Store that exhibit predatory behavior such as exfiltrating excessive user data from mobile devices and harassing borrowers for repayment. These apps, which were found in Southeast Asian and African countries, as well as India, Colombia, and Mexico, purportedly offer quick, fully-digital loan approvals with reasonable loan terms.

lookout

Lookout ZTNA Named an Overall Leader in KuppingerCole Leadership Compass

Zero trust, if implemented well, is recognized by the industry as the best way to support remote and hybrid work, especially as workers everywhere connect to SaaS applications to stay productive. But securing an entire organization goes way beyond SaaS apps. Legacy apps running on-premises or in private clouds are still critical for many organizations, especially for those who have made hefty investments in storage and network appliances to support these important applications.

lookout

Lookout Study Identifies an Ongoing Consumer Scam Surge

Over 60% of the world’s population relies on technology to navigate their daily lives — that’s over 5 billion people! Unfortunately, with such a large audience online, bad actors have turned to technology to deploy scams and make a profit. Scammers use an array of channels to target people with phishing and social engineering scams that appear real, in order to trick them into handing over valuable personal information.

lookout

Is My Phone Hacked? Here's How You Can Tell and What to Do

In today’s digital world, we rely on our mobile devices to navigate much of our daily lives. Beyond making calls and sending text messages, we use our phones for online shopping, banking, work, personal reminders, photos, videos, and so much more. While this technology offers great possibilities and convenience, it also can put your personal data at risk.

lookout

Lookout Discovers Long-running Surveillance Campaigns Targeting Uyghurs

Researchers from Lookout Threat Lab have uncovered two new surveillance campaigns targeting Uyghurs in the People’s Republic of China and abroad. One campaign introduces a novel Android surveillance tool we named BadBazaar that shares infrastructure with other previously encountered Uyghur-targeted tooling — as outlined in a 2020 whitepaper from the Lookout Threat Intelligence team.

lookout

BYOD and Phishing Attacks: Top Threats Facing U.S. Government Organizations

Telework has become a mainstay, and with it, so has employee reliance on personal mobile devices. These devices are difficult to monitor and keep up to date, presenting a unique security challenge for U.S. local, state, and federal government organizations.

lookout

Lookout and HPE Aruba Announce Integrated SASE Architecture

To streamline networking management and modernize IT operations organizations are deploying software-defined wide area network (SD-WAN) systems. But as networking becomes cloud-delivered, security often lags behind. With data and applications moving to the cloud, you need an efficient way to secure the activities that are going on between branch locations and the cloud.

lookout

From Access-centric Security to Data-centric Security

In the early days of internet security, an access-centric security model made sense. Access lists on routers were complemented by firewalls and, later, intrusion detection systems. Given the processing capacity available at the time, this was absolutely adequate and appropriate for protecting a website, even with e-commerce. But that was the 1990s, and the internet has become so much more than websites with some shopping capabilities. Now, it’s the backbone of our society.

lookout

Why Do I Need a Next-gen Secure Web Gateway?

The internet is now your default corporate network. This has some major perks — it means that your employees can access whatever they need from wherever they need it. But using the internet like this has also made your organization's security posture more complex. People are using networks and devices your IT doesn't manage, and they are accessing data that is scattered across countless apps.