Banner Fingerprint Dark

How A Federal Law Enforcement Agency Tackles Cyber Attribution

With a law enforcement mission, this federal agency finds and brings to justice national and ...
Bg Executive Briefing Series

Executive Briefing: Mitigating Cyber Risk

Federal News Network sat down with federal government executives to learn how they mitigate cyber ...
Early 2020 Insights from LookingGlass’ Quarterly Threat Landscape Report

Quarterly Threat Landscape Review for Q1 2020

In the first quarter of 2020, LookingGlass Cyber Solutions™ (LookingGlass) observed significant ...
Cyber Threats to the Financial Sector

Cyber Threats to the Financial Sector

Financial services firms are a top target of cyber attacks by everything from profit-oriented cyber ...
Threat Brief: Cyber Threats to the Energy Sector

Threat Brief: Cyber Threats to the Energy Sector

Organizations in the energy sector are a leading target of cyber attacks including sophisticated ...

WEBINARS

Oasis Webinar Website Banner

Elevating Security Orchestration with CACAO

Cybersecurity experts join forces to present an overview of the new, emerging standard, designed to ...
Early 2020 Insights from LookingGlass’ Quarterly Threat Landscape Report

Early 2020 Insights from LookingGlass’ Quarterly Threat Landscape Review

We face unprecedented times as security teams race to enable the rapid digital transformation ...
Lgc Deception Tech Non Dt Users Webinar Web Header

Lure & Deceive: Using Deception Technology to Defeat your Adversary

LookingGlass Cyber invites you to learn more about deception technology techniques with our ...

PODCASTS

Cyberchat Wtop Header Sept2019

Integrating Cyber Intelligence with a Mature Network

Today’s cybersecurity executives have an enormous responsibility. We have moved from a ...
Cybersecurity Battleground

Cybersecurity battleground – Status of cyber threat info sharing

Cybersecurity threats and information sharing between the public, private and government sectors is ...
The Geopolitics of Cyber Attacks

PODCAST: The Cyber Consequences of “America First”

President Trump’s summit in Vietnam with North Korean leader Kim Jong Un went bust. Will talks ...
Threat-Platform-Data-Sheet-Preview-Images-ScoutPrime

scoutPRIME®

The Platform for More Intelligent Security Management LookingGlass scoutPRIME makes security ...
Automated Threat Response ScoutShield

scoutSHIELD

LookingGlass scoutSHIELD™ Threat Intelligence Gateway is a high assurance, zero-touch security ...
Threat Platform Scoutthreat Preview Image

scoutTHREAT

scoutTHREAT by LookingGlass, helping disseminate intelligence by assigning risk scores, and ...
Cyber-Threat-Intell-Data-Sheet-Preview-ADS

Automated Data Services

Fueling your security operations with the highest-grade intelligence is essential to having the ...

Cyber Attack Surface Analysis

The LookingGlass® Supplier Cyber Attack Surface Analysis provides organizations with a ...
IRD 100 Automated Threat Response

LookingGlass IRD-100™

The LookinGlass™ Intelligent Response and Deception (IRD) 100™ is a network appliance enabling ...

VIDEO

LookingGlass
scoutTHREAT™
Platform

 

FEATURED VIDEO

LookingGlass scoutTHREAT™ Platform

Cybersecurity is continuously evolving—both threat actor methods and security practitioner defense. Continuously adjusting to these evolving Tactics, Techniques, and Procedures (TTPs) is a challenge to even the most advanced security operations. Collecting high-quality intelligence is not enough—security teams must be able to contextualize, process, and put into practice the intelligence it ingests in order to protect their organization.

Product Videos


Webinars


Corporate Videos

Social Engineering Protection Banner

Protect Your Organization from Targeted Scams

Social engineering is one of threat actors’ most used attack vectors in today’s threat ...
Overcoming the Cyber Skills Gap

Overcoming the Cyber Skills Gap

A looming topic over the cybersecurity industry is the shortage of skilled cyber workers. In this ...
Cyber Security ABCs

Cyber Security ABCs: An Infographic for Securing your Home or Business

So far, 2018 has seen 850 reported data breaches and 34 million exposed records. And that's only in ...
Assembling a Modern Security Operation Center

Assembling a Modern Security Operation Center

Enterprise-level SOCs may have as many as 50 security appliances, all which are difficult to ...
You're Only As Strong As Your Weakest Third Party

You’re Only As Strong As Your Weakest Third Party

Third party risk monitoring infograph from LookingGlass Cyber, the leaders in 3rd party risk ...
Deep or Dark Web Infographic

Deep or Dark Web?

Have questions about the differences about the deep or dark web, differences and challenges? An ...