Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lookout

A New Approach to Data Security for the New Year

Over the last few years, we have seen more and more organizations moving into hybrid and remote working environments. With that change, IT teams have learned that they cannot trust the network like they have in the past. Using the internet, employees now have direct access to your organization's resources, circumventing traditional security tools like virtual private networks (VPNs) and firewalls.

Organizations Are Banning TikTok. Should You Do the Same?

In today's security conscious climate, countries and organizations worldwide waste little time debating whether a risky mobile application should be banned — regardless of its popularity. With security and data privacy at the center of public and private sector conversations, these issues typically come about when an app is found to have concerning data collection and handling practices.

The Internet-Based Threats Putting Your Organization at Risk

The way we connect in the workplace has changed. For one, “the workplace” isn’t just limited to the office anymore, and that means instead of relying on a corporate network, employees are using the internet to get their work done. While this has been a game-changer for enabling productivity, this reliance on the internet also opens you up to a host of internet-based threats.

A Security Work Stream Is Critical to IT Modernization

With new technology being developed at a rapid pace, adaptability is crucial for a company to thrive against its competitors. IT cloud modernization is a great way to drive sales growth, have the edge over your competitors, and boost your employees’ productivity while enabling greater satisfaction and collaboration with your partners, contractors, and customers.

Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise

The first steps for any organization in creating a data security strategy are accurately identifying all of their sensitive information and securing that data from unauthorized access, regardless of where it resides. This is why I’m excited to announce the integration of Titus and Boldon James, leading data classification systems from Fortra (formerly HelpSystems), with the Lookout security service edge (SSE) solution.

Lookout Discovers Hundreds of Predatory Loan Apps on Google Play and Apple App Store

Researchers at Lookout Threat Lab have discovered close to 300 mobile loan applications on Google Play and the Apple App Store that exhibit predatory behavior such as exfiltrating excessive user data from mobile devices and harassing borrowers for repayment. These apps, which were found in Southeast Asian and African countries, as well as India, Colombia, and Mexico, purportedly offer quick, fully-digital loan approvals with reasonable loan terms.

Lookout ZTNA Named an Overall Leader in KuppingerCole Leadership Compass

Zero trust, if implemented well, is recognized by the industry as the best way to support remote and hybrid work, especially as workers everywhere connect to SaaS applications to stay productive. But securing an entire organization goes way beyond SaaS apps. Legacy apps running on-premises or in private clouds are still critical for many organizations, especially for those who have made hefty investments in storage and network appliances to support these important applications.

Lookout Study Identifies an Ongoing Consumer Scam Surge

Over 60% of the world’s population relies on technology to navigate their daily lives — that’s over 5 billion people! Unfortunately, with such a large audience online, bad actors have turned to technology to deploy scams and make a profit. Scammers use an array of channels to target people with phishing and social engineering scams that appear real, in order to trick them into handing over valuable personal information.