A new global survey by Lookout, Inc. today unveiled concerning insights into the state of mobile cybersecurity preparedness, revealing a significant gap between security leaders’ confidence and the actual vulnerability of their organizations. The survey of more than 700 security leaders globally exposes a pervasive overconfidence in employees’ ability to detect modern mobile-centric threats, leaving businesses significantly more exposed than they realize.
The survey’s most critical insights include:
- 58% of companies have experienced incidents due to executive impersonation scams via text or voice, highlighting the severe impact of sophisticated social engineering tactics.
- 77% of respondents have experienced one or more mobile phishing attacks in the past six months, underscoring the ubiquity of these threats.
- 51% admit to having inconsistent visibility of social engineering attempts, creating massive security blind spots.
Despite these alarming statistics, the survey revealed pervasive overconfidence: 96% of leaders are confident their employees can spot a phishing attempt that comes via their mobile devices. Yet, over half reported incidents where employees fell victim to executive impersonation scams, leading to financial loss or sensitive data exposure. Furthermore, even with widespread security training efforts, “lack of training” remains the top reason cited for employees clicking suspicious links, suggesting current education may not be keeping pace with the rapidly evolving modern threat landscape.
These findings highlight core issues:
- A dangerous overconfidence gap: Organizations feel ready for threats but are demonstrably underprepared, leading to successful attacks.
- Inadequate visibility: Traditional security solutions often lack visibility into mobile-centric social engineering attempts, meaning many manipulative efforts go unnoticed until it’s too late.
- Outdated training: Security awareness training isn’t evolving fast enough to truly prepare employees for today’s sophisticated, mobile-focused threats.
To address these pressing challenges, Lookout emphasizes a multi-faceted approach to secure the “front line” – employees and their mobile devices. This includes:
- Implementing an AI-first social engineering and human risk solution: This provides baseline protection against today’s Modern Kill Chain.
- Integrating Mobile Endpoint Detection and Response (EDR): Gaining strategic mobile security data points, such as vulnerable assets and web traffic analysis, by integrating EDR into existing SIEM, SOAR, EDR, or XDR solutions.
- Sophisticated and ongoing security awareness training: Training specifically designed for mobile-centric threats, including simulated phishing and social engineering exercises that reflect current malicious tactics, fostering a culture of vigilance and easy, judgment-free reporting.
The report can be found here: https://mms.businesswire.com/media/20250710838048/en/2520234/1/lookout-2025-simplydirect-survey-report-us.pdf?download=1.
About the Survey
The data presented in this report is sourced from the independent research company Censuswide, which conducted the survey in June 2025. More than 700 security leaders globally were polled across various industries. Censuswide is a member of the British Polling Council and abides by and employs members of the Market Research Society and follows the MRS code of conduct and ESOMAR principles.
Lookout Introduces Mobile AI Visibility and Governance to Expose Shadow AI Risk
Posted in Commentary with tags Lookout on April 29, 2026 by itnerdLookout today with the launch of Lookout AI Visibility & Governance, a mobile-native solution designed to provide organizations with the visibility needed to discover, govern, and secure AI adoption across their mobile ecosystem.
By extending AI agent discovery and policy control into the mobile environment, Lookout provides a missing layer of visibility, enabling organizations to identify “Shadow AI” activity on mobile devices, detect unauthorized agent behavior, and enforce policy where traditional controls have no reach.
The new offering delivers a real-time view of an organization’s AI footprint by identifying both sanctioned and unsanctioned AI use on mobile devices, exposing activity that traditional endpoint and cloud-centric discovery tools cannot detect. It provides actionable, evidence-based visibility to enforce policy, reduce risk, and maintain control over AI usage across the mobile domain. As a strategic extension of Lookout’s mobile security platform, it goes beyond device protection to directly govern AI activity, preventing unintended data exposure from both autonomous agents and “Shadow AI,” and securing the interactions users rely on every day.
Bridging the Mobile AI Governance Gap
A recent survey of CISOs and senior security leaders commissioned by Lookout highlights the magnitude of the challenge. Key findings from the survey include:
● Visibility gaps: Nearly 60% of surveyed organizations cannot monitor AI activity on mobile devices, leaving the majority of mobile AI activity operating in the shadows
● Agentic blind spots: 68% of surveyed organizations lack visibility into the workflows and permissions of autonomous AI agents on users’ devices.
● Hidden risks: 72% of surveyed organizations cannot identify AI Software Development Kits (SDKs) embedded in the apps their employees use.
Lookout AI Visibility & Governance acts as a strategic force multiplier across Lookout’s mobile security platform, extending protection from the device to the AI activity occurring on it. It strengthens a layered defense that secures not only devices and users but also the AI-driven interactions that operate on their behalf.
Key features and benefits include:
● Comprehensive AI App Discovery & Shadow AI Visibility: Obtain real-time inventory of all AI apps—sanctioned and unsanctioned—across corporate and BYOD devices, exposing hidden “Shadow AI” and turning mobile risks into governed assets.
● Agentic Behavior Monitoring: Continuously analyze AI-driven behavior and map permissions to ensure autonomous agents do not execute unauthorized workflows or access sensitive enterprise data.
● Intelligent Data Guardrails & Policy Enforcement: Prevent sensitive data from reaching unsanctioned AI services with real-time controls that stop unauthorized access and exfiltration.
● Automated Compliance Alignment: Generate audit-ready evidence aligned to the European Union’s Artificial Intelligence Act (EU AI Act), the U.S. National Institute of Standards and Technology’s AI Risk Management Framework (NIST AI RMF), and the international standard ISO/IEC 42001, delivering the traceability required for effective AI risk management and regulatory compliance.
To learn more about how Lookout AI Visibility & Governance is transforming mobile security:
Leave a comment »