Lookout Profile Banner
Lookout Profile
Lookout

@Lookout

Followers
45K
Following
2K
Media
3K
Statuses
11K

We are a data-centric cloud security company, purpose-built for the intersection of enterprise and personal data.

Boston, MA
Joined August 2008
Don't wanna be here? Send us removal request.
@Lookout
Lookout
1 year
In this @helpnetsecurity article, @Lookout CEO Jim Dolce sheds light on the need to secure mobile devices to combat the growing threats targeting cloud environments. https://t.co/JRvlWYxWZq
Tweet card summary image
helpnetsecurity.com
Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats, acknowledging mobile access complexities.
5
1
8
@Lookout
Lookout
1 month
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
0
2
@EconomicDefense
For The Good
7 days
Where is god?
7
10
216
@Lookout
Lookout
2 months
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
0
0
@Lookout
Lookout
3 months
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
0
1
@Lookout
Lookout
4 months
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
2
4
@Lookout
Lookout
5 months
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
0
0
@Lookout
Lookout
10 months
With the recent launch of Lookout’s Mobile Intelligence APIs, you will gain immediate visibility into mobile threat blind spots. These APIs can seamlessly integrate with your existing SIEM, SOAR, or XDR for elevated detection and response. Learn how: https://t.co/GQQUtuVnOI
0
0
7
@Lookout
Lookout
10 months
With Lookout’s new Mobile Intelligence APIs, security teams can integrate mobile data into their broader security strategy to identify cross-platform attacks. Learn how: https://t.co/GQQUtuVnOI
0
0
1
@Lookout
Lookout
10 months
Lack of visibility lets attackers exploit your mobile security blind spot. Lookout’s new Mobile Intelligence APIs enable your security team to stream mobile threat events, audits, and device state changes into your SIEM, SOAR, EDR, or XDR. Learn how: https://t.co/GQQUtuVnOI
0
0
3
@Lookout
Lookout
10 months
While #cloud storage allows for easy data sharing and collaboration, it also opens up potential vulnerabilities. Ensuring your #data remains secure requires a robust approach that combines prevention, detection, and remediation. Learn how: https://t.co/VVBnaICjL7
0
0
2
@Lookout
Lookout
10 months
You are invited to explore our interactive environment and experience mobile endpoint security built to protect against modern-day threats. Register now for the next session: https://t.co/3MneD5HDF4
0
0
1
@Lookout
Lookout
10 months
Are you able to detect Shadow IT within your organization? Watch to learn how Lookout can help you detect & prevent shadow IT usage and reduce the risk of data breaches from advanced internet threats: https://t.co/uc9xdH6sAQ
0
0
1
@Lookout
Lookout
10 months
By understanding the risks of #genAI tools and proactively addressing them, organizations can take advantage of AI while safeguarding their most valuable assets — their data. Learn how: https://t.co/0DCw8dRatT
0
0
1
@Lookout
Lookout
10 months
VPNs, once the standard for remote access, are now inefficient and risky, hindering productivity and exposing organizations to threats. Learn why it's time to make the switch: https://t.co/oNe8kson1y
0
0
1
@Lookout
Lookout
10 months
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
0
2
@Lookout
Lookout
10 months
Is your organization equipped to defend against advanced internet threats? Cloud-based SWGs have evolved to become a critical tool to safeguard businesses from these advanced attacks. Watch on-demand to learn how:
fortra.com
Ensure users remain productive and protected on the web.
0
0
0
@Lookout
Lookout
10 months
The reliance on mobile devices for work has provided an opportunity for attackers to phish legitimate log-in credentials. Lookout protects company data by blocking #mobile #phishing attacks before they get started. Request a demo today: https://t.co/jFWSNwy4Hx
0
0
0
@Lookout
Lookout
10 months
The cybersecurity landscape is changing — and fast. And that means security and IT leaders are being asked to pivot yet again. Join our upcoming webinar as our team of experts share their threat, trend, and best practice predictions for 2025: https://t.co/BtimH7KOxb
0
0
1
@Lookout
Lookout
10 months
Why would a cybercriminal pretend to be your CEO? Watch Verizon and Lookout explore the new threat trend of executive impersonation and how to protect your sensitive cloud data. https://t.co/2eg4IIA5qt
0
0
1
@Lookout
Lookout
10 months
With the launch of our Smishing and Executive Impersonation Protection features for iOS and Android, admins get industry-first visibility and reporting, enabling you to identify a coordinated attack. Learn more in this overview: https://t.co/fw6oWfYuHI
0
0
2
@Lookout
Lookout
11 months
Learn how Lantum, a workforce platform for healthcare organizations, protects sensitive data, and ensures compliance with Lookout Secure Cloud Access: https://t.co/YOTKkm0MpM
0
0
1