October 14, 2025
AI is now embedded in mobile workflows, with both cloud-based and on-device agents autonomously performing actions that mix personal and corporate data — creating a new class of mobile risk that evades traditional controls. As intelligence shifts to the edge, organizations need visibility into AI agents’ permissions, data flows, and behavior, along with policy guardrails that can monitor, restrict, or block actions to prevent agent misuse or takeover. Lookout defines this new security layer by discovering AI agents, profiling their behavior, enforcing policy, and integrating telemetry into SOC tooling to make mobile AI safe, auditable, and compliant at scale.
READ MORE >
September 10, 2025
Lookout has introduced Smishing AI, an AI-driven mobile protection technology built to detect social-engineering attacks that target people rather than devices. Instead of relying on known malicious links or senders, it uses large language models to analyze the context and intent of messages — even link-less and never-before-seen threats — while preserving user privacy through opt-in controls, contact filtering, de-identification, and zero-retention policies. The launch signals Lookout’s broader shift toward AI-first protection as attackers increasingly use AI to weaponize trust and manipulate employees.
READ MORE >
July 10, 2025
The Q2 2025 Lookout Mobile Threat Landscape report highlights the rising risk posed by employees and their mobile devices — now the most heavily used and least protected endpoints in the enterprise. While social-engineering via mobile channels has become the dominant attack vector, traditional mobile malware and vulnerabilities still present significant exposure. As sophisticated groups like Scattered Spider and Shiny Hunters increasingly exploit smartphones as an entry point, the report quantifies the scale of these risks to help security teams understand where to prioritize mobile defense.
READ MORE >
March 1, 2023
Stolen employee login credentials are one of the most effective ways for bad actors to infiltrate your organization’s infrastructure. Once they have the login information of one of your accounts in hand, it becomes much easier for them to bypass security measures and gain access to your sensitive data.
READ MORE >
January 25, 2023
A company’s brand is more than just its logo and color palette. It’s a signal to the world about their vision and commitment. This is why I’m super excited that Lookout is debuting a reimagined identity and position centered around freedom of control.
READ MORE >
January 4, 2023
When it comes to the way we work, change is now the status quo — and it often happens so quickly that security teams have a tough time keeping up. Organizations that try to keep using their perimeter-based security solutions are hindering their workers’ ability to collaborate while also losing a handle on their data.
READ MORE >
January 3, 2023
Over the winter holidays, Southwest Airlines, one of the U.S.’ largest and most reputable airlines was forced to cancel around 45% of its scheduled flights. It’s difficult to pinpoint the exact reason for this meltdown, but in my opinion this is likely due to outdated infrastructure and IT systems. Other airlines also had to deal with bad weather and holiday traffic, but were not faced with the same level of disruption.
READ MORE >
