Why Should Enterprises Care About APTs? Defend Against Chinese, Russian Cyber Espionage Hacking Groups and Other Nation-State Actors

APTs aren’t just the concerns of national governments. See why private enterprises need to pay attention to these threat actors and their campaigns.

NIST 800-124 Cybersecurity Publication Revision: How to Implement Mobile Security

NIST recently released a comprehensive document offering valuable insights and guidelines for implementing robust mobile endpoint security solutions.

Mitigating Cloud Supply-Chain Risk: Office 365 and Azure Exploited in Massive U.S Government Hack

According to SolarWinds filings with the SEC, the involved attackers were able to compromise the company’s Microsoft Office 365 emails with forged SAML tokens.

BYOD and Phishing Attacks: Top Threats Facing US Government

Lookout recently released our 2022 US Government Threat Report and we've picked out the main takeaways about the top threats currently facing U.S. government organizations.

Protecting Sensitive and Regulated Data in University and Government Healthcare Systems Requires a Unified Approach

To ensure that they are protected against intrusion, compromise, disruption and data exfiltration, hospital systems need to rethink the way they deploy cybersecurity.

Cybersecurity at the Tactical Level: The Importance of StateRAMP

Rather than tackle new security gaps in isolation, state and local governments need the resources and expertise of the federal government and the private sector.

Lookout and U.S. Govt. on New Vision for Zero Trust

We're excited that we have been selected by the National Institute of Standards and Technology (NIST) to collaborate on its Zero Trust architecture development efforts.

Four Steps to Modernizing Government Cybersecurity | Zero Trust

It is vital for agencies to understand the steps they can take right now to implement Zero Trust to safeguard against modern cyber attacks and comply with new regulations.

Mission Possible: Kiersten Todt on Securing the Public Sector

I recently had the pleasure of having Kiersten Todt, Managing Director of the Cybersecurity Readiness Institute, on the Endpoint Enigma podcast.

Top Three Threats Facing US Government Employees Amid Telework

All levels of government are increasingly exposed to credential-harvesting mobile attacks as well as risks from adware and outdated operating systems.

The Federal Office Has a New Look: Here’s How to Keep it Secure

To fully secure a telework environment, agencies need to tackle two objectives – mobile threat awareness and a comprehensive mobile endpoint security strategy.

Q&A: Michael Kaiser on State of Election Campaign Security

According to Tech for Campaigns, 90% of presidential campaigns’ 2018 digital campaign ad spend was delivered to mobile devices.

The Increasing Need for Mobile Security Among U.S. Federal Agencies

Employees are accessing sensitive data through their personal smartphones and tablets while they’re outside the protective perimeter of the office.

Protecting Government Agencies From Phishing Attacks

Lookout Phishing & Content Protection is designed to keep the public sector secure from phishing attacks in a mobile-first world. Learn more today.

The Government IT Problem: Your Security Perimeter Has Disappeared

Government work has changed. Critical data needed for employees to work has moved to the cloud and needs to be accessible from any device, wherever employees are.

Q&A: An Update on FISMA Mobility Metrics for Federal Agency Leaders

Victoria Mosby, Federal Sales Engineer for Lookout, shares insights and talks about what needs to be done to strengthen the government’s overall mobile security posture.

An Inside Look at Nation-State Cyber Surveillance Programs

Based on attacker communications found on a command and control server, this talk provides rare insight into a nation state’s $23 million surveillance program.

Texts and Their Impact on Election Campaign Security

Lookout recognized that mobile devices could influence the elections, so that is why we held a special briefing on Capitol Hill in early October.

Day of Shecurity: The Top Women in Federal Cybersecurity

Now is the time to change the status quo by advocating more women to consider cybersecurity as a possible career path.

Government Employees Being Human: How Mobile Behavior Impacts Security

The federal government has moved aggressively in recent years to put mobile technology into the hands of its workforce.

Mobile Security at the Center of Federal Internet of Things (IoT)

The "Internet of Things Cybersecurity Improvement Act of 2017," ensures that vendors selling IoT devices to the U.S. government meet certain cybersecurity standards.

Better Federal Mobile Security — An Interview With Kiersten Todt

Over the past decade, the federal government has followed the rest of society in a general move towards mobility.

Federal IT Change and the Leaders Making It Happen

2018 will bring the most change on the federal IT front in the past two decades, with the move to mobile being a major catalyst.

The Single Biggest Misconception in Government Security Today: Federal Agencies Aren’t Being Attacked on Mobile

Government agencies are being actively attacked on mobile, according to a new Lookout survey of 200 security and IT professionals.

Why Government Should Embrace Personal Technology, Not Ban It

The recognition that mobile devices are insecure is a step in the right direction, but I have to wonder, is a ban the answer?

Lookout & DHS Partnership | Best Mobile Security for Govt. Agencies

Today, DHS S&T announced it is partnering with Lookout to enhance the powerful Lookout Mobile Endpoint Security solution for government agencies.

Q&A With Bob Stevens: Where Federal Agencies Are Putting Their Dollars in Mobile Security

Lookout VP of Federal Bob Stevens disusses how the Spectrum of Mobile Risk impacts government agencies and organizations.

DHS Study Confirms Federal Agencies Need to Take Immediate Steps to Secure Mobility

This study on Mobile Device Security affirms that mobile security is critically important for our nation's cybersecurity.

5 Non-Negotiable Principles to Combat Cyber War on Mobile

Cyber war is a term the U.S. government is intimately familiar with, but woefully unprepared for when it comes to mobile.

Presidential Commission on Enhancing National Cybersecurity: Prioritize Mobile Security Now

The Presidential Commission on Enhancing National Cybersecurity saying; de-prioritizing mobile security is no longer an option.

Protect Your Agency's Data from Adversarial States and Governments

Learn from our security experts how to stop phishing attacks and restrict apps that communicate with foreign adversarial nation states.

5 Best Practices for Achieving Zero Trust

More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time.

Lookout | GovLoop Academy

This course, developed in collaboration with Lookout, explores the key risks of app security and highlights two tools that can help you assess and address those risks.

Guilty Until Proven Innocent – Playing by Zero Trust Laws

Learn how Tyler Cohen Wood helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats

New Guidance for Mobile Security

Hear from US federal CISO's on why they're adopting new guidance from NIST on how to best secure mobile users, particularly those working with sensitive government data.

Securing Telework From 2020 and Beyond

As public and private industries shift to telework, thanks to long-term innovation and short-term necessity, it’s clear that telework is here to stay. But to what scale?

No items found.