Creative,glowing,circuit,antivirus,background.,cyberspace,and,encryption,concept.,3d

Gartner Market Guide for Security Threat Intelligence Products and Services

April 05, 2022

According to the 2021 Gartner® Market Guide for Security Threat Intelligence Products and Services, “the threat intelligence market consists of mul...

Read more >
Watching,money,in,network.,the,concept,of,electronic,money.

Serious Security Exposures Across the Financial Sector

April 01, 2022

LookingGlass has been monitoring the financial sector for a decade. Given the increasing geopolitical tensions and growing threat of cyberattacks o...

Read more >
Metaverse,,futuristic,city,neon,light,with,power,energy,ball,light.

Serious Cyber Exposures For the Energy Sector

March 30, 2022

The energy sector is especially vulnerable to cyberattacks. Hackers associated with Russian internet addresses have been scanning the networks of f...

Read more >
Chief,project,engineer,holds,briefing,for,a,team,of,scientists

Why Organizations Are Drowning In A Data Deluge

March 28, 2022

Security and risk management leaders have more information at their disposal than ever before. However, the sheer amount of data is not helping to ...

Read more >
Global,business,concept.

3 Must-Haves for Every Threat Intelligence Program

March 15, 2022

Once deemed a luxury or rarely used by businesses while crafting their security operations, “TI products and services deliver knowledge, informatio...

Read more >
Fmdhqyrwqaexzyo

Executive Spotlight Video: Improved Cyber-Hygiene Key to Reducing Attack Surface Risks

March 03, 2022

LookingGlass Cyber Solutions Chief Product Officer Cody Pierce recently spoke with CyberScoop about the practices that help security teams gain vis...

Read more >
Shadow It Blog Image 1

How to Manage Shadow IT So It Doesn’t Haunt Your Business

February 24, 2022

With innovations lowering the barrier to adoption of new technologies like cloud computing and software-as-a-service, most business units can acqui...

Read more >
Fingerprint,scan,provides,security,access,with,biometrics,identification.futuristic,technology,in

What You Need to Know About the Federal Zero Trust Strategy

February 16, 2022

An organization implementing a zero-trust cybersecurity architecture means that no individual, asset, or software is trusted. Instead, every system...

Read more >
Why External Visibility Matters Banner

Critical Infrastructure and the Cyber Threats You Can’t See

January 25, 2022

Tradeoffs—we all have to make them. In today’s always-on, ever-evolving digital world, some of the most important decisions organizations and consu...

Read more >