U.S. Federal Cybersecurity TodayComputer security regulations have come a long way from their early beginnings. Even before the Federal Information Security Management Act (FISMA), there was the Computer Security Act of 1987 (CSA). The Computer Security Act was enacted by the 100th United States Congress in response to a lack of computer security prote
According to its own website, FedRAMP serves three different of partners: federal agencies, Cloud Service Providers (CSP) and third-party assessment organizations. This article will focus on CSPs and how a good CSP can provide services that provide monetary savings for your agency.Cloud Service Providers (CSP) and FedRAMPFedRAMP’s defines Cloud Service Provi
This warfare is being fought with computers and special created malware. It is Cyber Warfare and every large nation is playing along
The most recent exposed vulnerability from Microsoft demonstrates exactly the type of method Nation-State attackers’ use.
So how does a nation as sophisticated as the United States keep losing the cyber battle? The problem lie
In June of 2015 the United States Office of Personnel Management (OPM) announced they had been the target of what became one of the largest breaches of government data in history.
When the dust settled, it was determined that over 20 million people were affected.
The data stolen from individuals was Social Security numbers, names, addresses, relatives, and
Cyber war is a term the U.S. government is intimately familiar with, but woefully unprepared for when it comes to mobile.
Government employee mobile devices are a relatively new attack surface, and a particularly valuable one for espionage missions and other criminal intent. Mobile devices access confidential, classified, and other protected data classes. A
It’s hard to keep up with the hundreds of security-specific headlines published every week.
So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore President Obama’s new proposal to increase cybersecurity spending, a breach on the FBI, and the FCC commissioner’s comments on ha
In this series we’re highlighting some of our awesome employees and the work they do. In their own words, you’ll hear about our employees biggest wins, favorite moments, and reasons for doing what they do. Interested in starting a career at Lookout? Check out our open jobs.
Alex Gladd
Forward Deployed Engineer, Sales
Why do you do your job?
Living in D.C.,
While the federal government might be under the impression that it doesn’t have a BYOD program, it is overlooking a key issue: Shadow BYOD.
Shadow BYOD is very similar to Shadow IT, in which employees use technologies — usually to enhance their productivity — that the IT department has not sanctioned or deployed. In Shadow BYOD’s case, it’s the