Beware of CryptoChameleon, the new phishing threat that uses social engineering to trick victims
| | | | |

Beware of CryptoChameleon, the new phishing threat that uses social engineering to trick victims

In the ever-evolving landscape of cyber threats, the CryptoChameleon phishing attack has emerged as a new example of how cybercriminals use advanced social engineering to gain access to victim’s accounts. Like a chameleon, the hackers camouflage themselves, but as trusted authorities, to blend in and stay hidden. This makes these attacks tough to spot and…

Welcome to the era of spatial computing with Workspace ONE
| | | | | | | | |

Welcome to the era of spatial computing with Workspace ONE

On February 2, 2024, Apple launched Apple Vision Pro, ushering in a new era of “spatial computing.” The release of Apple Vision Pro was a landmark moment in computing, with Apple delivering their significant app ecosystem on what could be considered the most advanced standalone computing device to date. This new device could have important…

7 critical areas of your mobile security plan to lock down in 2024
| | | | | | |

7 critical areas of your mobile security plan to lock down in 2024

As 2024 kicks off to a roaring start, it’s time to consider mobile security plans. Please don’t wait until after a breach to evaluate and implement advanced mobile protection. The recently released Verizon Mobile Security Index report reinforces the fact that advanced mobile threats are a clear and present danger to organizations. Mobile devices represent…

Secure your world against mobile device threats with Lookout and VMware
| | | | | | | | | | | | | |

Secure your world against mobile device threats with Lookout and VMware

This year, the Cybersecurity and Infrastructure Security Agency (CISA) theme for Cybersecurity Awareness Month in October was “Secure Our World.” This theme included four focused sub-themes: enabling multi-factor authentication, using strong passwords and a password manager, updating software, and recognizing and reporting phishing.   My colleagues and I covered these themes extensively at VMware Explore 2023 Las…

Why is mobile security indispensable to your organization? 
| | | | | | | | | | | |

Why is mobile security indispensable to your organization? 

In the never-ending battle against cybercriminals, knowledge sharing is one of our most effective defenses. The more we can simultaneously learn from and educate fellow security experts, the more likely we are to stay one step ahead of threat actors.  At VMware Explore 2023 Las Vegas, Lookout and VMware cybersecurity experts had the privilege to…

Why is mobile security indispensable to your organization? 
| | | | | | | | | | | |

Why is mobile security indispensable to your organization? 

In the never-ending battle against cybercriminals, knowledge sharing is one of our most effective defenses. The more we can simultaneously learn from and educate fellow security experts, the more likely we are to stay one step ahead of threat actors.  At VMware Explore 2023 Las Vegas, Lookout and VMware cybersecurity experts had the privilege to…

Unpacking VMware Explore: 3 key takeaways for mobile security leaders
| | | |

Unpacking VMware Explore: 3 key takeaways for mobile security leaders

Last week at VMware Explore 2023 Las Vegas our team had the opportunity to interact with leading security experts across many industries and to talk about security for anywhere work. These experts generously shared their ideas and insights — even concerns that impact their day-to-day thinking. Throughout panel discussions and individual conversations at the booth,…

| | |

VMware Workspace ONE Mobile Threat Defense wins 2023 SC Award for Best Mobile Security Solution

VMware Workspace ONE Mobile Threat Defense has won the top spot, securing the award for Best Mobile Security Solution in the 2023 SC Awards, which recognize the excellence in U.S. cybersecurity. This is the second award for our VMware mobile security solution. Earlier this year Mobile Threat Defense received a Gold Award — the highest…

Practical approaches to zero trust with VMware and NIST
| |

Practical approaches to zero trust with VMware and NIST

The National Cybersecurity Center of Excellence (NCCoE), part of the U.S. National Institute of Standards and Technology (NIST), recently updated the “Implementing a Zero Trust Architecture” guide. VMware is a contributor to this seminal document, which aims to demystify zero trust security and architecture by laying out practical approaches to implementing zero trust solutions.  What…

Schedule these Workspace Security sessions at VMware Explore 2023 Las Vegas
| | |

Schedule these Workspace Security sessions at VMware Explore 2023 Las Vegas

Stolen credentials, phishing, and exploitation of vulnerabilities are the top three ways that cyber attackers gain access to company networks and information, according to the 2023 Verizon Data Breach Investigations Report.  To further complicate the cybersecurity ecosystem:  83% of breaches involved external actors, with the majority being financially motivated.  74% of breaches involved the human…