Resources

How A Federal Law Enforcement Agency Tackles Cyber Attribution
January 5, 2021
With a law enforcement mission, this federal agency finds and brings to justice national and ...



Executive Briefing: Mitigating Cyber Risk
November 11, 2020
Federal News Network sat down with federal government executives to learn how they mitigate cyber ...



Quarterly Threat Landscape Review for Q1 2020
May 22, 2020
In the first quarter of 2020, LookingGlass Cyber Solutions™ (LookingGlass) observed significant ...



Cyber Threats to the Financial Sector
November 18, 2019
Financial services firms are a top target of cyber attacks by everything from profit-oriented cyber ...



Threat Brief: Cyber Threats to the Energy Sector
November 1, 2019
Organizations in the energy sector are a leading target of cyber attacks including sophisticated ...



CyberEdge 2019 Cyberthreat Defense Report
April 30, 2019
WEBINARS



Elevating Security Orchestration with CACAO
Event date: June 23, 2020 [Ended]
Cybersecurity experts join forces to present an overview of the new, emerging standard, designed to ...



Early 2020 Insights from LookingGlass’ Quarterly Threat Landscape Review
Event date: June 3, 2020 [Ended]
We face unprecedented times as security teams race to enable the rapid digital transformation ...



Lure & Deceive: Using Deception Technology to Defeat your Adversary
Event date: May 27, 2020 [Ended]
LookingGlass Cyber invites you to learn more about deception technology techniques with our ...
PODCASTS



Integrating Cyber Intelligence with a Mature Network
September 16, 2019
Today’s cybersecurity executives have an enormous responsibility. We have moved from a ...



Cybersecurity battleground – Status of cyber threat info sharing
April 25, 2019
Cybersecurity threats and information sharing between the public, private and government sectors is ...



PODCAST: The Cyber Consequences of “America First”
March 6, 2019
President Trump’s summit in Vietnam with North Korean leader Kim Jong Un went bust. Will talks ...



scoutPRIME®
February 23, 2020
The Platform for More Intelligent Security Management LookingGlass scoutPRIME makes security ...



scoutSHIELD™
June 17, 2019
LookingGlass scoutSHIELD™ Threat Intelligence Gateway is a high assurance, zero-touch security ...



scoutTHREAT™
February 23, 2020
scoutTHREAT by LookingGlass, helping disseminate intelligence by assigning risk scores, and ...



Automated Data Services
September 7, 2017
Fueling your security operations with the highest-grade intelligence is essential to having the ...



Cyber Attack Surface Analysis
September 7, 2017
The LookingGlass® Supplier Cyber Attack Surface Analysis provides organizations with a ...



LookingGlass IRD-100™
May 7, 2018
The LookinGlass™ Intelligent Response and Deception (IRD) 100™ is a network appliance enabling ...
FEATURED VIDEO
LookingGlass scoutTHREAT™ Platform
Cybersecurity is continuously evolving—both threat actor methods and security practitioner defense. Continuously adjusting to these evolving Tactics, Techniques, and Procedures (TTPs) is a challenge to even the most advanced security operations. Collecting high-quality intelligence is not enough—security teams must be able to contextualize, process, and put into practice the intelligence it ingests in order to protect their organization.
Product Videos
Webinars
-
Proactive Cybersecurity: Modeling Adversarial Behavior
-
The Need for Speed: Integrated Threat Response
-
Through the LookingGlass: Top Trends to Keep Your Organization Cyber Aware
-
The Modern SOC: Automated Intelligence Tradecraft and the Human Element
-
Reducing Risk by Examining Threats Beyond the Perimeter
-
Surgical Threat Mitigation: Sharpen Your Response
-
2018 World Cup: Who will be the first to strike?
-
Making Threat Intelligence Affordable for the Mid-Level Market
-
Through the LookingGlass – What We Learned From Major Cybersecurity Events in 2017
-
5 Ways to Boost Network Security with a DNS Firewall
-
Building a Threat Intelligence Program
-
Threat Intelligence Gateway: An Unconventional Weapon for An Unconventional War
-
Phishing Prevention Be Suspicious and Don't Get Hooked
-
How Are You Managing Cyber Risk From Your Third-Party Relationships?
-
Threat Intelligence-As-A-Service: Fortify Your Security Posture
-
Are Your Third Party Vendors Exposing Your Organization to Cyber Threats?
-
Are Your Third Parties a Ticking Time Bomb?
-
Don’t Believe the Hype: The Dark Web is just another source for intelligence
-
Success Factors in Threat Intelligence: Part 4 – Connecting the Dots
-
Bigger Isn't Always Better: Assessing Cyber Risk to Reduce Your Attack Surface 2017
-
Assessing Targeted Attack Techniques 2017
-
Success Factors in Threat Intelligence: Part 1 – Business Requirements
-
Success Factors in Threat Intelligence: Part 2 - Starting a Program
-
Success Factors in Threat Intelligence: Part 3 - Key Elements
-
A Year in Review: Cyber Trends in 2019
-
Defend Your Global Attack Surface
Corporate Videos



Protect Your Organization from Targeted Scams
June 20, 2019
Social engineering is one of threat actors’ most used attack vectors in today’s threat ...



Overcoming the Cyber Skills Gap
October 9, 2018
A looming topic over the cybersecurity industry is the shortage of skilled cyber workers. In this ...



Cyber Security ABCs: An Infographic for Securing your Home or Business
October 2, 2018
So far, 2018 has seen 850 reported data breaches and 34 million exposed records. And that's only in ...



Assembling a Modern Security Operation Center
September 11, 2018
Enterprise-level SOCs may have as many as 50 security appliances, all which are difficult to ...



You’re Only As Strong As Your Weakest Third Party
August 28, 2018
Third party risk monitoring infograph from LookingGlass Cyber, the leaders in 3rd party risk ...



Deep or Dark Web?
August 21, 2018
Have questions about the differences about the deep or dark web, differences and challenges? An ...