All resources sponsored by:

Lookout

12 Matches
Putting the Trust in Zero Trust
sponsored by Lookout
WHITE PAPER:As workforces become more distributed and employees favor their BYOD devices, cybersecurity risks evolve to the point where traditional perimeter tactics are no longer relevant. Enter zero trust for mobile – a scalable approach to protecting every device within the network. Read on to learn more about this.
Posted: 22 Sep 2020 | Published: 22 Sep 2020
Get This Now


How Lookout Helps You Align with NIST Guidelines
sponsored by Lookout
CASE STUDY:When it comes to structuring cybersecurity strategies and initiatives, many organizations turn to guidelines and best practices outlined by the National Institute of Standard and Technology (NIST). In this case study, take a closer look at NIST’s updated mobile security guidelines and discover how Lookout can help get you aligned.
Posted: 22 Sep 2020 | Published: 22 Sep 2020
Get This Now


Twitter Phone Spear Phishing Attack
sponsored by Lookout
WHITE PAPER:On July 15th, 2020, Twitter experienced a security incident where a malicious actor gained access to the back-end account management console through a phone spear phishing campaign. 130 accounts, including those of Barack Obama, Bill Gates and Elon Musk, were affected. Read this white paper to learn specifics and recommendations.
Posted: 21 Sep 2020 | Published: 21 Sep 2020
Get This Now


Worldwide Mobile Threat Management Software 2020 Vendor Assessment
sponsored by Lookout
ANALYST REPORT:Security leaders pursuing Zero Trust should use MTM to secure all mobile devices – both managed and unmanaged – that employees use to stay productive wherever they work. Learn why IDC named Lookout a Leader in MTM three years in a row.
Posted: 18 Sep 2020 | Published: 18 Sep 2020
Get This Now


Mobile Security for the Remote Worker
sponsored by Lookout
RESOURCE:In the remote world, mobile device use is increasing, employees are taking more risks, and 9 to 5 is out the window. The result: security is tougher to nail down. With phishing on the rise (and productivity apps attracting phishing), mobile devices must be monitored more closely than ever. Take a glance at this infographic for more details.
Posted: 27 Jul 2020 | Published: 27 Jul 2020
Get This Now


TikTok Case Study
sponsored by Lookout
WHITE PAPER:Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.
Posted: 24 Jul 2020 | Published: 24 Jul 2020
Get This Now


Security That Works Wherever You Go: Empower Your Workers to Safely Stay Productive
sponsored by Lookout
DATA SHEET:IT security professionals have never had their hands fuller than during ‘the new normal’. Cybercriminals see the many hundreds of thousands (if not millions) of remote workers as a breaching buffet, and as a result, organizations need to secure their workforces ASAP. View this brochure to find out how you can keep employees secure wherever they go.
Posted: 24 Jul 2020 | Published: 24 Jul 2020
Get This Now


Mobile Phishing: Myths & Facts Facing Every Modern Enterprise Today
sponsored by Lookout
WHITE PAPER:It may surprise you that the rate at which people fall for mobile phishing attacks has increased 85% every year since 2011. Organizations are constantly working to defend against phishing, but methods of defense against email attacks may not likewise prevent mobile attacks. Read this white paper for 3 myths and 3 facts on mobile phishing.
Posted: 23 Jul 2020 | Published: 23 Jul 2020
Get This Now


Lookout Discovery: Chinese Surveillanceware
sponsored by Lookout
WHITE PAPER:The Lookout Threat Intelligence team discovered 4 malware tools connected to advanced mobile threat campaigns active since 2013. China was the main target, but at total of twelve languages were targeted. To learn how to avoid these attacks, tap this brief to learn about Lookout's Threat Advisory Service & how it monitors networks/mobile devices.
Posted: 23 Jul 2020 | Published: 23 Jul 2020
Get This Now


CIO Insight: Why Mobile Threat Defense
sponsored by Lookout
DATA SHEET:According to a study from Lookout Inc., there was in a 37.1% increase in mobile phishing from Q4 of 2019 to Q1 of 2020. Statistics like this one solidify the need for mobile device security today. Tap into this data sheet to reveal more mobile threat stats from 2020.
Posted: 22 Jul 2020 | Published: 22 Jul 2020
Get This Now


Top Mobile Security Threats: Insight Into Threats and Attackers
sponsored by Lookout
EGUIDE:Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
Posted: 30 Mar 2017 | Published: 28 Mar 2017
Get This Now


Mobile Data Security Threats: Hype vs. Reality
sponsored by Lookout
EGUIDE:As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.
Posted: 20 Jun 2016 | Published: 14 Jun 2016
Get This Now


12 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info