Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mobile app SDKs: The nesting dolls of hidden risk

Here’s an obvious statement for you: mobile applications are essential to how we go about our lives. From sharing files with colleagues to managing finances and connecting with family and friends, they seem to be able to do everything we need. But here’s the catch: developers rarely build apps from scratch and security is not typically their top priority. To quickly add features, they often rely on prepackaged code known as software development kits (SDKs).

3 Ways to Secure SAP SuccessFactors and Stay Compliant

The work-from-anywhere economy has opened up the possibility for your human resources team to source the best talent from anywhere. To scale their operations, organizations are leveraging the cloud to accelerate essential HR functions such as recruiting, onboarding, evaluating and more. SAP is leading this HR transformation with its human capital management (HCM) solution, SAP SuccessFactors.

Go cloud or go home: the advantage of cloud-delivered cybersecurity

It seems as if everything is happening in the cloud now — whether I’m sharing a document with a colleague or backing up family photos. This is happening in cybersecurity as well, where the storage flexibility and computing power of the cloud have enabled new ways to secure organizations.

Don't Let Attackers Crumble Your Cookies: Electronic Arts Breach Lessons

Leading American video game company Electronic Arts (EA) recently disclosed a breach that resulted in the theft of hundreds of gigabytes of data. The exfiltrated information included source code and software that power popular games like FIFA and Battlefield. What’s notable about this attack is that the attackers gained access to EA’s infrastructure through stolen Slack cookies that contained cached employee login credentials.

Lookout Unearths Android Crypto Mining Scams

Cryptocurrencies, once the exclusive domain of an idealistic fringe movement, have recently become attractive to mainstream retail investors. During the COVID-19 pandemic, the valuation of cryptocurrencies rose exponentially, reaching a market capitalization of over $2 trillion. Cybercriminals are always looking for the path of least resistance to make money and cryptocurrencies are now in their crosshairs.

Four Steps to Modernizing Government Cybersecurity with Zero Trust based on the Executive Order

The pandemic has accelerated digital transformation and telework on a scale never seen before. Employees are working from anywhere and collaboration in the cloud has skyrocketed. But this new environment has expanded the cyber attack surface, compromising critical U.S. infrastructure and lives of our citizens. The recent slew of major cyber attacks including SolarWinds, Microsoft Exchange and Colonial Pipeline, has moved cybersecurity improvements to the top of the agenda for the U.S.

Lookout and NTT DOCOMO Partner to Deliver Security from Device to Identity

Tablets and mobile devices have become an essential part of our daily lives, especially as 5G expands and remote work continues. This means these devices hold some of the most sensitive information that is tied to our digital identity. Today, I’m excited to share that we have expanded our consumer partnership with NTT DOCOMO to include identity monitoring and protection for DOCOMO’s subscribers across Android and iOS devices.

Lookout Announces Expanded Partnership with Google Cloud to Deliver Zero Trust Security from Endpoint to Cloud

Cloud-based solutions have become essential to how we work and play in the digital era. Many organizations continue their rapid embrace of cloud-based solutions to enable their employees the flexibility to work from anywhere. Cloud spending this year could hit $332 billion, up 23% from 2020, according to a forecast by Gartner, Inc. 1 The cloud has raised our expectations regarding productivity as organizations view the cloud as a true engine of competitive advantage.

Not All CASBs Are Created Equal. How Do You Choose?

Software as a service (SaaS) apps have reshaped the way we stay productive. By having everything easily accessible in the cloud, we are able to get work done from anywhere and on any device. But, as we know, this flexibility has also introduced security challenges, as your data is also easier to reach for malicious actors. This is why the purchase of a cloud access security broker (CASB) is never that controversial. Most organizations understand that cloud apps require additional protection.

Lookout and Jamf: Defending Against Mobile Threats

I’m pleased to share that Jamf and Lookout have formed a partnership to integrate Jamf Pro with Lookout Mobile Endpoint Security. Jamf provides mobile device management for Apple devices and specializes in serving IT professionals, schools and small businesses. Together, Lookout and Jamf enable your organization to deploy and provision iOS devices while protecting them against mobile threats such as phishing and network attacks.