Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

NIST's Definition of Cloud Computing

According to recent research, 92 percent of large organizations use more than one cloud. The report also predicts that by the end of 2021, 55 percent of enterprise workloads will rely on a public cloud. Clearly cloud adoption is expanding, and will continue to do so into the future. Despite its prevalence, cloud computing can be a confusing concept.

Phishing operators abuse bank APIs to improve phishing TTPs

True Login phishing kits are continuously being developed by threat actors to improve their TTPs in luring victims. By using true login kits, the phishing operators have a higher chance of making potential victims believe they are logging into the real website. True login kit developers are abusing publicly available APIs of the banking company to be able to query login information to be shown to potential victims, in turn luring the victim even further into the operations.

Introducing Bearer inventory

The engineering organization of companies building modern cloud applications can get incredibly complex. Security teams are caught between the explosive growth of engineering teams and the fragmentation of software architecture. As a result, it can be a challenge to get a clear, complete and up-to-date view of engineering components. Bringing clarity about the software architecture is the first step to enable you to assess and remediate data security risks properly.

The "Just Because" of Zero Trust | OptivCon 2021 Interview

How does Lookout define Zero Trust? The concept of Zero Trust architecture has evolved. The last two years supercharged its evolution as collaboration has forced data to go wherever it’s needed and, as a result, you’ve lost the visibility you once relied on to secure your infrastructure. Lookout Chief Marketing Officer Mike Banic speaks with Senior Manager of Security Solutions Hank Schless on how Zero Trust has evolved, the current context around it, and ways to approach the concept in a way that helps it feel more achievable.

How to Pass a FedRAMP Audit for SaaS Providers: Part 1

You work at a SaaS provider, and now you need to pass a FedRAMP audit. If that describes you, read on. This post will tell you (almost) everything you need to know about how to pass a FedRAMP Audit. For the rest, reach out to us. We will put you in touch with one of our Solution Engineers like me who have helped some of the largest SaaS providers in the world pass their FedRAMP audit prior or after IPOing. It’s what we do.

Prepare for the next phase of work from anywhere security

What are some of the steps you take to continuously ensure data loss isn’t an issue and what can others do to stay ahead of the problem? Hear from Tom Davison, Senior Director of Security Engineering, and Nick Sears, VP Sales SASE Solutions at Lookout to find out how to keep your data secure with Lookout's SASE, CASB, and ZTNA.

Charts - Bar Charts

Netskope Advanced Analytics: Learn how to build and customize bar charts. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.