Aaron Cockerill and Mike Banic of Lookout talks about how Lookout overcomes mobile-specific challenges to provide a comprehensive anti-phishing solution.
With a smaller screen, developers are forced to create simplified interfaces on your tablets and smartphones. But this also makes it easy for scammers to hide telltale signs of a phishing link. Aaron Cockerill and Mike Banic of Lookout talks about why we're more vulnerable to phishing when using a mobile device.
Threat researchers Apurva Kumar and Justin Albrecht go through the Lookout threat research team’s latest discovery, Goontact. The malware, which we have named Goontact, targets users of illicit sites, typically offering escort services, and steals personal information from their mobile device. You can also follow the team’s work at twitter.com/lookoutthreats
Regardless of how many employees you have, your growing business faces the same threats as larger organizations. And you depend on engaging your customers on a personal level to stand out in the crowd. So to preserve that relationship, you need a mobile security solution that protects your data and their privacy.
Our mission is to protect your data in today's post-perimeter, privacy-focused world. With your applications and data migrating to the cloud, and 5G wireless networks right around the corner, securing your mobile endpoints is no longer an option—it’s an imperative.
We don’t need to be in the office to stay productive anymore. Cloud apps and personal devices have enabled us to connect to work from anywhere. To fully protect your organization in this climate, you have to assume that no device is trustworthy until its risk level is verified.
Regardless of how many employees you have, your growing business faces the same threats as larger organizations. And you depend on engaging your customers on a personal level to stand out in the crowd. So to preserve that relationship, you need a mobile security solution that protects your data and their privacy.
The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations to enforce their endpoints and establish continuous conditional access to data based on risk. Aaron Cockerill, Chief Strategy Officer at Lookout discusses how to effectively shift security to your mobile endpoints to protect your company’s sensitive data.
As part of Cybersecurity Awareness Month, Lookout held a special briefing sponsored by Rep. Ted Lieu and Rep. Jim Longevin, that focused on how cybersecurity attacks can impact the entire democratic process -- from political campaigns and elections to journalists, lobbyists and activists that participate in the process. The session included a live demo of how a cyberattack could happen on a mobile device.