Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

2021 Prediction: Mobile will enable ransomware

As many of us continue to stay at home, we are using our phones, tablets and Chromebooks more – both for personal and work purposes. With their small screens and multitude of messaging channels, they are a perfect vector for phishing messages aimed at stealing credentials for corporate access. Hear from Kristna Balaam, Senior Security Intelligence Researcher about what we got right, and what surprised us. See our 2022 predictions on our newest blog: bit.ly/3pS3rfb

15 Minute Friday: How a Leading University Hospital Health System Secures Patient Data with Lookout

Hear a use case of how a leading university hospital secures patient data through its journey to the cloud. In addition to cloud protection, needs quickly were realized for cloud DLP and EDRM to fully secure and keep sensitive data safe and HIPAA compliant in the cloud. In this 15 minute session, we will dive into the problem faced and how it was solved. No sales pitches, no demos, just solutions.

How Does a Secure Web Gateway (SWG) Work? | Lookout

Can a Secure Web Gateway help secure my business’ data and workforce? Secure Web Gateway (SWG) protects web surfing users by filtering malware. With a SWG, remote users send their traffic directly to the cloud where traffic processing and security policy enforcement occurs. Remote users access virtual gateways in the cloud which is then responsible for connecting the user to the desired website. Discover all the key benefits SWG can offer your business and remote employees with Lookout.

Zero Trust for State and Local Government

The cybersecurity threat landscape is shifting rapidly. More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time. Those are only the publicly reported instances – the actual number is likely exponentially higher, and these attacks are growing increasingly sophisticated. Meanwhile, high-profile threats to dams, electrical grids and other facilities, including the Colonial Pipeline attack this year, have shown the vulnerability of America’s critical infrastructure.