Skip to main content
Spotify for Podcasters
Security Soapbox | Privacy, Security and Everything in Between

Security Soapbox | Privacy, Security and Everything in Between

By Lookout

This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
Available on
Apple Podcasts Logo
Castbox Logo
Google Podcasts Logo
Overcast Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

Management Isn't Security: Why You Need More Than MDM

Security Soapbox | Privacy, Security and Everything in BetweenJun 29, 2020

00:00
18:54
Don’t Think Twice, Modern IT is Alright: Top Ways to Modernize Your IT Today (ft. Faz Sadikali, Cloud Insights)

Don’t Think Twice, Modern IT is Alright: Top Ways to Modernize Your IT Today (ft. Faz Sadikali, Cloud Insights)

Organizations are making big decisions to implement cloud solutions to boost collaboration and gain competitive advantage. But many aren’t prepared to handle the risks that cloud services introduce. In this episode of Security Soapbox, host Hank Schless talks shop with Faz Sadikali, Founder of Cloud Insights, on how to build secure workstreams and level up IT to reap the benefits of the cloud while ensuring data remains secure. Read Faz's blog about IT modernization here: https://bit.ly/3h3qqlW
Dec 05, 202220:49
The Sleeping Giant is Waking Up: the State of Mobile Security Today ft. Cile Montgomery/VMware

The Sleeping Giant is Waking Up: the State of Mobile Security Today ft. Cile Montgomery/VMware

With the rapid adoption of BYOD and the growing remote workforce, IT and security teams are just catching on to the need for mobile security to protect corporate data and assets. In this episode, host Hank Schless is joined by Cile Montgomery, Product Line Marketing Manager at VMware, to discuss the new risks mobile devices present to organizations and what trends to expect in the next year for mobile security.
Nov 14, 202217:09
Soap Suds: The Return of SharkBot

Soap Suds: The Return of SharkBot

SharkBot, a notorious banking trojan, has just resurfaced since it was first spotted in the wild in October 2021. In this newest variation, the malware targets banking credentials through two apps with collectively over 60,000 downloads on Google Play. In this episode, host Hank Schless discusses what you need to know about SharkBot and how to protect yourself and your organization.
Sep 21, 202206:07
The Twilio Breach and Phishing: Lessons Learned

The Twilio Breach and Phishing: Lessons Learned

Twilio, Cloudflare and other organizations reported employees were targeted with a phishing campaign leveraging a kit codenamed 0ktapus. Tune in for this short episode to learn more about the mechanisms behind the phishing campaign and tips for mitigating this threat. To learn more about this breach and how to protect your organization, check out our blog on this topic: https://bit.ly/3cuweCI
Aug 29, 202206:26
Fast and Furious: How to Tackle Speed and Complexity in Security with Ramy Houssaini (BNP Paribas)

Fast and Furious: How to Tackle Speed and Complexity in Security with Ramy Houssaini (BNP Paribas)

Cybersecurity challenges are moving at cloud speed and leaving legacy approaches in the dust. On this week’s episode, host Hank Schless is joined by Ramy Houssaini, head of privacy and cyber risk at BNP Paribas, to discuss the top security considerations CISOs should be aware of in this rapidly changing security environment. To learn more about what Ramy spoke about, check out Hank's blog on this topic: https://bit.ly/3KtYMsI
Jun 30, 202216:54
Risky Business: How to Win Over Your Boards of Directors

Risky Business: How to Win Over Your Boards of Directors

When pitching to your board of directors, security should be treated like any other business unit. On this week’s Security Soapbox, our host Hank Schless is joined by Paul Simmonds, CEO of the Global Identity Foundation and Former CISO of AstraZeneca, ICI and Motorola Cellular Infrastructure. They discuss how to cut through buzzwords and turn security into a business enabler. Check out Paul’s guest blog on lookout.com to learn more: https://bit.ly/38zFunf
May 18, 202218:50
You Need All the Telemetry You Can Get: Zero Trust is a Shared Responsibility (feat. Google)

You Need All the Telemetry You Can Get: Zero Trust is a Shared Responsibility (feat. Google)

While Zero Trust is a popular framework, it doesn’t come with a user manual. On this week’s Security Soapbox, Ashish Kathapurkar and Nikhil Sinha from Google join Hank Schless to discuss how securing your cloud apps requires an approach that goes beyond the apps’ capabilities. Check out our blog to learn more: https://bit.ly/3vAo15w
Apr 21, 202218:09
5-minute Fridays: Cyber Readiness And The Russia-Ukraine War

5-minute Fridays: Cyber Readiness And The Russia-Ukraine War

As the conflict in Ukraine continues, including in cyberspace, the rest of the world needs to be prepared. Listen in on this 5-minute Fridays episode where I discuss what’s going on in Ukraine and how organizations can be cyber ready. For more information, also check out the blog I wrote on this topic: https://bit.ly/3MMIuMu
Mar 11, 202204:11
Breaking the Chain: Are You the Unintended Victim of a Supply Chain Attack? (Ft. Vodafone Security Experts)

Breaking the Chain: Are You the Unintended Victim of a Supply Chain Attack? (Ft. Vodafone Security Experts)

Between SolarWinds and Log4J, supply chain attacks have become a common occurrence over the past couple of years. In this episode, host Hank Schless is joined by Vodafone security experts Andy Deacon and Verity Carter-Johnson to define what a supply chain is, what the intended and unintended consequences are, and what legal ramifications exist for those who fall victim. Check out our blog about supply chain attacks: https://bit.ly/3Om5C52
Feb 18, 202219:29
Let’s Get Real About Zero Trust: How To Assess Your Security Posture

Let’s Get Real About Zero Trust: How To Assess Your Security Posture

While most of us understand Zero Trust conceptually, the path to Zero Trust is a complex and constantly evolving journey. In this episode, host Hank Schless is joined by Andy Olpin, Solutions Engineer at Lookout to scale back all the marketing noise surrounding the term and discuss how organizations can pragmatically get started with Zero Trust. Check out this blog to learn how you can assess your Zero Trust posture: https://bit.ly/3uVVXul
Jan 05, 202223:14
Is 2022 the Beginning of the End of On-prem Security?

Is 2022 the Beginning of the End of On-prem Security?

Nearly two years after we were forced to experiment with remote work, 2022 will be an inflection point for both threats and cybersecurity solutions. Tune into our annual predictions episode to hear what Lookout CTO of SASE Products Sundaram Lakshmanan thinks will happen next year. We'll be discussing everything from software supply chains to threat hunting and data protection. Check out Sundaram's predictions blog: https://bit.ly/3uX4Aog
Dec 17, 202117:16
Ain’t No Mountain High Enough: Achieving Zero Trust for a Mobile Workforce (feat Art Ashmann from VMware)

Ain’t No Mountain High Enough: Achieving Zero Trust for a Mobile Workforce (feat Art Ashmann from VMware)

Widespread remote work has called for a paradigm shift in how we conduct enterprise cybersecurity. On this week’s Endpoint Enigma, VMware Staff EUC Solutions Engineer, Art Ashmann joins Hank Schless to discuss how mobile and cloud technology have enabled us to manage both work and personal responsibilities from anywhere and what organizations can do to securely take advantage of it. Check out our blog to learn more: https://bit.ly/3rDK4Hj
Nov 22, 202120:23
Know Thy Enemy: What is Pegasus and What Can You Do?

Know Thy Enemy: What is Pegasus and What Can You Do?

First uncovered by Lookout and Citizen Lab in 2016, the Pegasus spyware was confirmed to have been used on targets such as business executives and government officials. Veteran of the cybersecurity industry, Joseph Davis of Microsoft, walks us through how spyware came to be, its implications and how you can protect yourself and your organization against Pegasus. Check out the latest about Pegasus here: https://bit.ly/3EqlHlK
Aug 06, 202118:49
Go Cloud or go Home: Why Cybersecurity Needs to Live in the Cloud

Go Cloud or go Home: Why Cybersecurity Needs to Live in the Cloud

Cloud-delivered security solutions offer unrivaled storage flexibility and computing power. But do they introduce new risks? Join host Hank Schless and Lookout head of sales engineering for International, Tom Davison, as they discuss the differences between on-premise security solutions and cloud-delivered ones. Check out our blog on why cloud-delivered security is critical: https://bit.ly/3EqYdga
Aug 04, 202117:16
When Your Old Reliable is no Longer Enough: Why it’s Time to Move on From VPNs

When Your Old Reliable is no Longer Enough: Why it’s Time to Move on From VPNs

Businesses have relied on VPNs for over two decades. But with the rapid adoption of cloud services and mobile technology, the way we store and access data has changed. On this week’s Endpoint Enigma, Lookout CTO of SASE Products Sundaram Lakshmanan joins Hank Schless to discuss why VPNs fall short when it comes to security and user experience and what the best alternative is for providing secure network access to your remote workers. Check out our blog about ZTNA and how it augments VPN deployments: https://bit.ly/3K0Mnuq
Jun 28, 202122:01
Healthcare Security in the Age of 5G and Remote Work

Healthcare Security in the Age of 5G and Remote Work

The healthcare industry has undergone a major digital transformation since HIPAA was introduced in 1996. With technology rapidly outpacing regulations, keeping patient data safe and hospitals up and running has become more challenging than ever. Mike Murray, CEO of Scope Security and former Lookout CISO sits down with host Hank Schless to assess what healthcare looks like in the age of 5G and our work-from-anywhere world. Check out our blog about healthcare security challenges: https://bit.ly/3Eqk7Ae
May 26, 202121:00
Mission Possible: Kiersten Todt on Securing the Public Sector

Mission Possible: Kiersten Todt on Securing the Public Sector

When it comes to defending a nation, a strong cybersecurity plan is vital. In this episode, we’re joined by Kiersten Todt, Executive Director of the Presidential Commission on Enhancing National Security and Managing Director of the Cyber Readiness Institute to discuss the top cybersecurity challenges facing the U.S. public sector. Check out our blog about challenges in the public sector: https://bit.ly/3rCg1zQ
Apr 21, 202123:20
Women Making Waves in Cybersecurity (feat. guest host Kristina Balaam)

Women Making Waves in Cybersecurity (feat. guest host Kristina Balaam)

This episode, Lookout threat researcher Kristina Balaam takes over as guest host to discuss the importance of diversity in cybersecurity with federal sales engineer Victoria Mosby. Victoria is a member of the Day of Shecurity initiative and the Lookout Foundation. Tune in to hear their experiences as engineers in a traditionally male-dominated field and their advice for starting your career in cybersecurity. Check out Kristina's blog about why we need more women in cybersecurity: https://bit.ly/3L03L3J
Mar 03, 202133:09
New Year, New Challenges: What to Expect in 2021

New Year, New Challenges: What to Expect in 2021

2020 was an especially challenging year, including for the cybersecurity industry. But what should we expect for 2021? Join host Hank Schless, threat researcher Kristina Balaam and Christoph Hebeisen, head of the Lookout Threat Research team, to find out what’s going on with privacy, COVID-19-related threats, ransomware and other trends. Check out our 2021 Predictions blog: https://bit.ly/3vvktkV
Jan 25, 202121:12
The Supply Chain Reaction: Lessons from SolarWinds

The Supply Chain Reaction: Lessons from SolarWinds

A software supply chain attack put SolarWinds in the headlines of every news publication in America. In this episode, we’re joined by Tim LeMaster, Director of Systems Engineering at Lookout, to discuss what happened, whether this could happen to mobile devices and how a Zero Trust security model can safeguard your infrastructure. Check out our blog about SolarWinds: https://bit.ly/3vrhtpL
Jan 08, 202118:59
Threat Hunt With the Right Red Thread: Why You Need Mobile EDR

Threat Hunt With the Right Red Thread: Why You Need Mobile EDR

Offices are empty and people are working from home. Tablets and smartphones have become a primary way workers are staying productive. Alex Gladd, Principal Product Manager joins us to talk about why you can’t stop breaches without including mobile devices as part of your threat hunting efforts. Check out this blog about why mobile endpoint detection and response is critical: https://bit.ly/3MfipUX
Dec 16, 202020:59
Why Legacy Security Can't Protect Modern Devices

Why Legacy Security Can't Protect Modern Devices

Tablets and smartphones are increasingly becoming the center of our personal and professional lives. In this episode, we’re joined by Aaron Cockerill, Chief Strategy Officer at Lookout. We discuss what’s different about securing mobile endpoints compared to desktops and laptops, and why desktop security can’t protect mobile. Check out this blog about the critical capabilities you need in a mobile security solution: https://bit.ly/3jOlNdv
Oct 15, 202021:13
Multiyear Surveillance Campaigns Discovered Targeting Uyghurs

Multiyear Surveillance Campaigns Discovered Targeting Uyghurs

The Lookout Threat Intelligence team discovered a series of Chinese campaigns targeting the Uyghur Muslim minority spanning across 14 countries dating back to at least 2013. This week we’re joined by threat researchers Apurva Kumar and Kristin Del Rosso and Threatpost.com reporter Lindsey O’Donnell to discuss the importance of this discovery and what we can learn from it. Read our threat discovery blog here: https://bit.ly/3jPO7Ms
Sep 03, 202028:33
The Dangers of Phishing in Our Modern World

The Dangers of Phishing in Our Modern World

With the proliferation of smartphones and tablets, phishing attacks are no longer what they used to be – delivered via email and opened on a desktop computer. Tune in to find out how the likes of WhatsApp, Twitter, and Tinder have made phishing so dangerous on the mobile device. Check out this blog about business email compromise and modern phishing: https://bit.ly/3MfgW0T
Jul 31, 202019:28
Management Isn't Security: Why You Need More Than MDM

Management Isn't Security: Why You Need More Than MDM

In this episode, we chat with our mobile security experts about mobile device management. Why is MDM in and of itself not security. What’s the best way to protect an organization’s smartphones and tablets? Listen in to find out. Check out this blog to learn the five reasons you need mobile security, even if you already have MDM: https://bit.ly/386W0ut
Jun 29, 202018:54
How to Secure Your Remote Workforce

How to Secure Your Remote Workforce

The outbreak of COVID-19 has forced many organizations to speed up the adoption of remote working. In parallel, cyber attackers responded with a variety of new emerging threats, taking advantage of the situation. In this  episode our guest, David Richardson, who brings more than 10 years of experience in security, will expose some of those threats and review the challenges and solutions in order to quickly adapt to a secure remote workforce. To learn more, check out our blog about remote work: https://bit.ly/3rFsjr9
May 28, 202020:10