Aaron Cockerill (@aaron_cockerill) 's Twitter Profile
Aaron Cockerill

@aaron_cockerill

lead product, security research and strategy at lookout, but the tweets are my own

ID: 575595098

linkhttp://www.lookout.com calendar_today09-05-2012 19:00:42

68 Tweet

96 Takipçi

129 Takip Edilen

Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

Today, Lookout announced the Post-Perimeter Security Alliance ahead of #RSA Conference 2019, with BlackBerry, Google Cloud, Okta, Inc., SentinelOne and VMware. Learn why this Alliance is needed in securing the Post-Perimeter World: okt.to/qvAnJH

Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

Will you be at #GoogleNext19 in #SanFrancisco? If so, be sure to attend Lookout's panel w/ Google Cloud, Gizmodo & TechTarget on #privacy & #security in a #postperimeter world: bit.ly/2JydX8x Mike Murray Jack Madden

Lookout (@lookout) 's Twitter Profile Photo

.Phishing AI has discovered a #mobile first #phishing campaign targeting Verizon customers. You can read about dyngnosis's findings in our new blog post: okt.to/RyvESX

.<a href="/PhishingAi/">Phishing AI</a> has discovered a #mobile first #phishing campaign targeting Verizon customers. You can read about <a href="/dyngnosis/">dyngnosis</a>'s findings in our new blog post: okt.to/RyvESX
Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

At the recent RSA Conference I spoke with CyberScoop News about the Post-Perimeter Security Alliance. You can see it here: okt.to/xufAoi #rsac2019 #postperimeter

Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

VPN was one of the areas people invested in when we all started working from home – but it’s not enough. If you want to protect your remote workers properly, you need security that protects your mobile endpoints. Check out this Lookout blog to learn more. bit.ly/3hKHIj6

VPN was one of the areas people invested in when we all started working from home – but it’s not enough. If you want to protect your remote workers properly, you need security that protects your mobile endpoints. Check out this <a href="/Lookout/">Lookout</a> blog to learn more. bit.ly/3hKHIj6
Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

Fantastic blog by my colleague Gert-Jan Schenk about the changing meaning of “shadow IT.” Key takeaways from this is that we now live in an age of bring-your-own-device as well as as bring-your-own-network. bit.ly/30hFnW3

Fantastic blog by my colleague Gert-Jan Schenk about the changing meaning of “shadow IT.” Key takeaways from this is that we now live in an age of bring-your-own-device as well as as bring-your-own-network. bit.ly/30hFnW3
Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

Thrilled to see Lookout and Google Cloud working together to enable #ZeroTrust and #BeyondCorp for mobile. As we continue to work remotely, organizations need to be able to secure their mobile devices regardless of whether they’re corporate or personal. bit.ly/36TpAAWg

Thrilled to see <a href="/Lookout/">Lookout</a> and <a href="/GoogleCloud/">Google Cloud</a> working together to enable #ZeroTrust and #BeyondCorp for mobile. 

As we continue to work remotely, organizations need to be able to secure their mobile devices regardless of whether they’re corporate or personal. bit.ly/36TpAAWg
Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

By adding research and threat hunting into our EDR solution, our customers get access to the same tools we used to expose some of the most sophisticated mobile threats ever found. Read my blog for Lookout to see how EDR can secure your organization. bit.ly/3dGX4no

By adding research and threat hunting into our EDR solution, our customers get access to the same tools we used to expose some of the most sophisticated mobile threats ever found.

Read my blog for <a href="/Lookout/">Lookout</a> to see how EDR can secure your organization. bit.ly/3dGX4no
Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

You should check out Alex @[email protected]'s blog about why #cybersecurity isn’t complete without endpoint detection and response (EDR) for mobile. He breaks down how to use mobile EDR and why you can’t ignore mobile in your EDR strategy. Via Lookout. bit.ly/3dX8Lqa

You should check out <a href="/alexgladd/">Alex @alexgladd@infosec.exchange</a>'s blog about why #cybersecurity isn’t complete without endpoint detection and response (EDR) for mobile. He breaks down how to use mobile EDR and why you can’t ignore mobile in your EDR strategy.

Via <a href="/Lookout/">Lookout</a>. bit.ly/3dX8Lqa
Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

This has significant ramifications for #cybersecurity. Traditional security only works when it has privileged access to the operating systems. But that doesn’t work on modern OSs like iOS, Android or Chrome OS – and soon MacOS. Via CNET. cnet.com/news/apples-ne…

Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

This Lookout blog by Hank Schless is a good reminder about the dangers of mobile #phishing. With the rise of mobile devices, the easiest way to breach an organization’s infrastructure now is by social engineering someone into giving you their credentials. bit.ly/2LeG3GY

This <a href="/Lookout/">Lookout</a> blog by <a href="/HHSchless/">Hank Schless</a> is a good reminder about the dangers of mobile #phishing. With the rise of mobile devices, the easiest way to breach an organization’s infrastructure now is by social engineering someone into giving you their credentials. bit.ly/2LeG3GY
Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

It used to be that only nation state actors had the means to launch mobile-targeting campaigns. This discovery by Lookout Research shows that organized crime are now launching their own attacks at tablets and smartphones. Via Lookout. bit.ly/3qVHWZs

It used to be that only nation state actors had the means to launch mobile-targeting campaigns. This discovery by <a href="/LookoutThreats/">Lookout Research</a> shows that organized crime are now launching their own attacks at tablets and smartphones.

Via <a href="/Lookout/">Lookout</a>. bit.ly/3qVHWZs
Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

Great predictions from Christoph Hebeisen, head of Lookout Research. Lots of business leaders I talked to said that remote work is here to stay. They’re going back and onboarding tech to ensure their workers are secure and productive. Via Lookout. bit.ly/34tRNw5

Great predictions from Christoph Hebeisen, head of <a href="/LookoutThreats/">Lookout Research</a>. Lots of business leaders I talked to said that remote work is here to stay. They’re going back and onboarding tech to ensure their workers are secure and productive. 

Via <a href="/Lookout/">Lookout</a>. bit.ly/34tRNw5
Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

I had a chance to talk to @CyberNews_com about why mobile #phishing is so dangerous. We tend to think our phones and tablets are safe because we trust them as personal devices. But this actually makes it easier for the attackers. Check out the article. bit.ly/3r1Zbrg

Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

Super excited to have CipherCloud (now part of Lookout) join Lookout. With many of us working remotely, organizations need to be able to secure their data from endpoint to cloud. We're now uniquely positioned to do exactly that. Read Jim Dolce's blog to learn more. bit.ly/38GnDrz

Super excited to have <a href="/CipherCloud/">CipherCloud (now part of Lookout)</a> join <a href="/Lookout/">Lookout</a>.

With many of us working remotely, organizations need to be able to secure their data from endpoint to cloud. We're now uniquely positioned to do exactly that.

Read Jim Dolce's blog to learn more. bit.ly/38GnDrz
Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

I’m super excited by Lookout’s latest #ZeroTrust milestone: the integration of security assessment capabilities with secure access infrastructure. By doing so, we’re providing organizations the ability to detect threats, stay compliant and stop breaches.linkedin.com/pulse/zero-tru…

Ivan Krstić (@radian) 's Twitter Profile Photo

The steps Apple is taking today will send a clear message: in a free society, it is unacceptable to weaponize powerful state-sponsored spyware against innocent users and those who seek to make the world a better place. apple.com/newsroom/2021/…

Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

Great predictions from Sundaram Lakshmanan, Lookout CTO, SASE Products. With #remotework becoming the standard, on-prem security isn't enough. To do the heavy lifting required for #ZeroTrust and proactive threat hunting, you need to leverage the #cloud. bit.ly/3EAfS4v

Great predictions from Sundaram Lakshmanan, <a href="/Lookout/">Lookout</a> CTO, SASE Products. With #remotework becoming the standard, on-prem security isn't enough. To do the heavy lifting required for #ZeroTrust and proactive threat hunting, you need to leverage the #cloud. bit.ly/3EAfS4v
Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

It’s incredibly satisfying to see Gartner validate our efforts in their first Magic Quadrant for #SSE. Lookout is in the business of securing data and this recognition is only more rocket fuel for us. Check out this blog by Jim Dolce to learn more.lookout.com/blog/2022-gart…

Aaron Cockerill (@aaron_cockerill) 's Twitter Profile Photo

A #ransomware attack isn’t an isolated event; it’s a persistent threat. I'm looking forward to discussing this important topic with Microsoft Chief Security Advisor Sarah Armstrong-Smith in this upcoming webinar. To learn more, register here: bit.ly/3KeSlsu