
Free Daily Podcast Summary
by Lookout
Get key takeaways, quotes, and insights from Security Soapbox | Privacy, Security and Everything in Between in a 5-minute read. Delivered straight to your inbox.
The most recent episodes — sign up to get AI-powered summaries of each one.
The Q1 2025 Lookout Mobile Threat Landscape Report highlights emerging human risk and AI as the primary drivers of security threats. This most recent report emphasizes that attackers are targeting individuals through their mobile devices early in their attacks – exploiting the native trust we have in these devices and our natural tendencies to engage with communications that drive curiosity.
2024 saw a surge in cyberattacks alongside rapid tech advancements, making it clear that staying ahead in the digital world is more important than ever. In this week's session, we’ll explore the top cybersecurity predictions for 2025 — highlighting emerging threats, key trends, and the latest strategies for fortifying your defenses. Listen as our expert panel shares valuable insights and predictions on: New ransomware tactics and data breach methods How AI is shaping both security solutions and cyberattacks Growing threats from nation-states The latest security regulations and compliance frameworks
On this week’s episode of Security Soapbox, we are joined by Jim Coyle, US Public Sector Field CTO at Lookout. We’re diving into the hot topic of election security; unpacking various threats, like disinformation campaigns, cyber espionage, and weaknesses in our election infrastructure — and who’s behind them. We’ll also chat about current protective measures and some innovative ideas, like using blockchain to fight misinformation. Watch the Billington Cybersecurity Summit session on Election Security here. Follow Hank on LinkedIn Follow Jim on LinkedIn
We’ve all received that urgent text message from our “CEO” asking us to take care of an urgent task. This form of social engineering has become a preferred tactic by threat actors who want to create a high-pressure situation in order to convince employees to send money or share sensitive data. This week’s episode will cover the why and how behind these attacks. We will also cover the critical role they play in the modern kill chain and how to protect against them. To see how Lookout protects against advanced smishing and executive impersonation attacks, read our release blog or watch the short overview video below. Blog: https://www.lookout.com/blog/smishing-prevention-executive-impersonation Video: https://vimeo.com/1009294652
On this week’s episode of Security Soapbox, we are joined by Charity Spiri, who oversees the Security Service Edge (SSE) product portfolio at Lookout. Were challenging the common perception of web-based threats being solely network attacks. Web threats encompass a wider range of risks, including data leakage, shadow IT, and security concerns from AI platforms. While not entirely new issues, these pose significant challenges within the ever-evolving web-based threat landscape. For a deeper dive into advanced web threats and how to protect your organization, check out Charity’s recent session, Defending Against Advanced Threats with a Modern Secure Web Gateway. Follow Hank Schless on LinkedIn Follow Charity Spiri on LinkedIn
In this week's episode of 5 Minute Friday, we discuss the new Digital Markets Act (DMA) in the EU and its potential impact on iOS security. We talk through the possible security risks and malware threats that could come from opening iOS devices to third-party app stores. To keep up to date on current threats: www.lookout.com/threat-intelligence
In this week's episode of 5 Minute Friday, we discuss BadBazaar, an iOS & Android surveillanceware by China's APT-15, designed to target Uyghur Muslims. We take a dive into the invasive nature of Chinese "pre-criminal" surveillance and BadBazaar's recent expansion to iOS devices, providing insights into its early development and the evolving landscape of mobile threats. To keep up to date on current threats: www.lookout.com/threat-intelligence
In this week's episode of 5 Minute Friday, we discuss three critical vulnerabilities affecting both iOS and Android devices. We also discuss the importance of patching these vulnerabilities, and the modern phishing attack tactics used to exploit them. To keep up to date on current threats: www.lookout.com/threat-intelligence
Free AI-powered daily recaps. Key takeaways, quotes, and mentions — in a 5-minute read.
Get Free Summaries →Free forever for up to 3 podcasts. No credit card required.
Listeners also like.
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
AI-powered recaps with compact key takeaways, quotes, and insights.
Get key takeaways from Security Soapbox | Privacy, Security and Everything in Between in a 5-minute read.
Stay current on your favorite podcasts without falling behind.
It's a free AI-powered email that summarizes new episodes of Security Soapbox | Privacy, Security and Everything in Between as soon as they're published. You get the key takeaways, notable quotes, and links & mentions — all in a quick read.
When a new episode drops, our AI transcribes and analyzes it, then generates a personalized summary tailored to your interests and profession. It's delivered to your inbox every morning.
No. Podzilla is an independent service that summarizes publicly available podcast content. We're not affiliated with or endorsed by Lookout.
Absolutely! The free plan covers up to 3 podcasts. Upgrade to Pro for 15, or Premium for 50. Browse our full catalog at /podcasts.
Security Soapbox | Privacy, Security and Everything in Between covers topics including News. Our AI identifies the specific themes in each episode and highlights what matters most to you.
Free forever for up to 3 podcasts. No credit card required.
Free forever for up to 3 podcasts. No credit card required.