ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Lookout

  • Putting the Trust in Zero Trust

    As workforces become more distributed and employees favor their BYOD devices, cybersecurity risks evolve to the point where traditional perimeter tactics are no longer relevant. Enter zero trust for mobile – a scalable approach to protecting every device within the network. Read on to learn more about this.

  • How Lookout Helps You Align with NIST Guidelines

    When it comes to structuring cybersecurity strategies and initiatives, many organizations turn to guidelines and best practices outlined by the National Institute of Standard and Technology (NIST). In this case study, take a closer look at NIST’s updated mobile security guidelines and discover how Lookout can help get you aligned.

  • Twitter Phone Spear Phishing Attack

    On July 15th, 2020, Twitter experienced a security incident where a malicious actor gained access to the back-end account management console through a phone spear phishing campaign. 130 accounts, including those of Barack Obama, Bill Gates and Elon Musk, were affected. Read this white paper to learn specifics and recommendations.

  • Worldwide Mobile Threat Management Software 2020 Vendor Assessment

    Security leaders pursuing Zero Trust should use MTM to secure all mobile devices – both managed and unmanaged – that employees use to stay productive wherever they work. Learn why IDC named Lookout a Leader in MTM three years in a row.

  • Mobile Security for the Remote Worker

    In the remote world, mobile device use is increasing, employees are taking more risks, and 9 to 5 is out the window. The result: security is tougher to nail down. With phishing on the rise (and productivity apps attracting phishing), mobile devices must be monitored more closely than ever. Take a glance at this infographic for more details.

  • TikTok Case Study

    Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.

  • Security That Works Wherever You Go: Empower Your Workers to Safely Stay Productive

    IT security professionals have never had their hands fuller than during ‘the new normal’. Cybercriminals see the many hundreds of thousands (if not millions) of remote workers as a breaching buffet, and as a result, organizations need to secure their workforces ASAP. View this brochure to find out how you can keep employees secure wherever they go.

  • Mobile Phishing: Myths & Facts Facing Every Modern Enterprise Today

    It may surprise you that the rate at which people fall for mobile phishing attacks has increased 85% every year since 2011. Organizations are constantly working to defend against phishing, but methods of defense against email attacks may not likewise prevent mobile attacks. Read this white paper for 3 myths and 3 facts on mobile phishing.

  • Lookout Discovery: Chinese Surveillanceware

    The Lookout Threat Intelligence team discovered 4 malware tools connected to advanced mobile threat campaigns active since 2013. China was the main target, but at total of twelve languages were targeted. To learn how to avoid these attacks, tap this brief to learn about Lookout's Threat Advisory Service & how it monitors networks/mobile devices.

  • CIO Insight: Why Mobile Threat Defense

    According to a study from Lookout Inc., there was in a 37.1% increase in mobile phishing from Q4 of 2019 to Q1 of 2020. Statistics like this one solidify the need for mobile device security today. Tap into this data sheet to reveal more mobile threat stats from 2020.

  • Top Mobile Security Threats: Insight Into Threats and Attackers

    Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.

  • Mobile Data Security Threats: Hype vs. Reality

    As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.