How to Protect Your Data When Ransomware Strikes

A ransomware attack isn’t a single event; it’s persistent. To secure your organization, you need a full picture of what is happening with your endpoints, users, apps and data.

How to Protect Yourself from Supply Chain Attacks

To better understand these attacks, I invited Vodafone security experts Andy Deacon and Verity Carter-Johnson to the Lookout podcast.

Three Actions To Take Based on the Colonial Pipeline Ransomware Attack

Attackers launched a ransomware attack against the Colonial Pipeline that confirms how cybercriminals exploit reduced visibility, legacy security systems, and mobile devices.

Ransomware Attack Myths and How To Mitigate Risk

Learn how can protect your data from being held hostage from Microsoft Chief Security Advisor, Sarah Armstrong-Smith and Lookout Chief Strategy Officer, Aaron Cockerill.

Protect Enterprise Data in the Cloud From Ransomware

Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved. The scale of attacks has increased because of this.

Ransomware: A Cloudy Forecast

Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved.

Ransomware: A Cloudy Forecast (Swedish Edition)

Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved. IMPORTANT NOTE: The presenters speak in Swedish.

Half a Bitcoin To Get Your Data Back? How To Defeat Ransomware Attacks

The third episode in the Achieving Endpoint-to-Cloud Security series welcomes Magda Chelly, Head of Cyber Consulting, Former CISO, Founder of Women in Cybersecurity.

No items found.