Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lookout

Featured Post

The Zero-Trust Journey Every Organisation Must Make

Over the past decade, the working world has undergone a dramatic transformation. Spending each day of the week in an office is no more for most, while many have the flexibility to work from any location using a device and network that the organisation often has no control over. Productivity levels have certainly increased because of the flexible working environment, but it has opened the door to new challenges, mainly protecting the organisation's critical assets.

Why Should Enterprises Care About APTs? Defend Against Chinese, Russian Cyber Espionage Hacking Groups and Other Nation-State Actors

We often think of advanced persistent threats or APTs as threats primarily targeting governments for cyber espionage, but they could have just as much impact on the private sector. Oftentimes, both the techniques and the tooling used overlap between APTs and financially-motivated cybercriminals, and some APT groups themselves have taken to moonlighting as cybercriminals for profit.

Lookout Cloud Security Platform: Free Your Hybrid Workforce

A way to protect your hybrid workforce *and* your corporate data on any app, device, or endpoints? With the Lookout Cloud Security Platform, you can offer your employees the freedom to collaborate, at any place, any time, from any device with total peace of mind. And that’s because the Lookout Cloud Security Platform allows you to detect, mitigate, and respond to real-time threats without locking down apps and devices.

Ransomware Gangs Exploit Three Zero-Day Vulnerabilities in MOVEit

In quick succession at the end of May into mid-June, software developer Progress released three advisories that any customers using its popular managed file transfer (MFT) solution MOVEit should immediately update to the latest release. In this time, they were made aware of three critical vulnerabilities, CVE-2023-34362 on May 31, CVE-2023-35036 on June 9, and CVE-2023-35708 on June 15.

NIST 800-124 Cybersecurity Publication Revision: How to Implement Mobile Security

In today's increasingly mobile-driven world, securing our digital assets and protecting sensitive information is of paramount importance. To address this need, the National Institute of Standards and Technology (NIST) recently released the latest version of their publication, NIST 800-124 Rev. 2: Guidelines for Managing the Security of Mobile Devices in the Enterprise.

Enhancing Mobile Device Security: Applying the NIS2 Directive

Mobile devices have become indispensable in our modern lives, enabling us to stay connected, access information, and conduct transactions on the go. However, the rise of mobile usage for accessing corporate information is attracting the increased attention of cybercriminals seeking to exploit vulnerabilities and gain unauthorized access to sensitive data.