Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Securing telework 2020 and beyond

Teleworking isn’t just about your home desk: it’s about mobility, agility, and security. As public and private industries shift to telework, thanks to long-term innovation and short-term necessity, it’s clear that telework is here to stay. But to what scale? This webcast explored the concepts of security and mobility within the broader telework schema. How will personal devices and other technology tools accelerate the ease of telework? On the flip side, as attackers target devices, how can organizations protect personal devices from breaches?

CASB Solution

A cloud access security broker (CASB), is cloud-delivered software or on-premises software and/or hardware that acts as an intermediary between users and cloud service providers. The ability of CASBs to address gaps in security extends across software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS) environments. In addition to providing visibility, a CASB also allows organizations to extend the reach of security policies from their existing on-premises infrastructure to the cloud and create new policies for cloud-specific contexts.

Interview with a Hacker How are Attackers Targeting Mobile Devices

Every organization today utilizes mobile as a productivity tool by providing a full range of access to corporate resources for iOS and Android devices. With employees accessing O365, G Suite, Salesforce, and other services where attackers see an opportunity. Join Lookout and Eurofins to learn from the hacker's perspective.

Critical Capabilities for Mobile Vulnerability Management

As organizations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive. Allowing employees to work productively from any device and any location can open users to the risks that come with the shared nature of a mobile device. When your employees work from a personal device with access to corporate data, the device's health must be taken into account. It must be assessed for compliance with corporate security and risk policies.

Microsoft Integration for a secure mobile workforce

The demand for secure remote worker solutions has dramatically grown and corporations are trying to provide secure access to business data while preserving user privacy on their personal devices. Leveraging the new Microsoft Endpoint Manager App Protection with Lookout capability, organizations can provide secure access to O365 and Teams apps, related data, and user credentials from a user’s personal mobile devices.

Where does mobile fit into security frameworks

Hear how mobile fits into guidance provided by organizations like NIST and CIS, how that affects compliance and security policies, and why it should matter to organizations everywhere. Join Tim Lemaster and Hank Schless as they chat about this and answered questions about how smartphones and tablets fit into your security strategy.