Cowritten by Mark Belk, National Government Chief Architect and Rebecca Lawson, Senior Director Security
The pace of change seen in the adoption of new methods and technology deployed by nefarious characters in cyberspace continues to place new demands on government information systems. There are multiple persistent cybersecurity threats targeting governments, critical infrastructure, economic institutions and
Speeds and feeds has been the mantra for as long as I can remember but is all that about to change? In my view the answer is no. As NFV discussions, trials and implementations gather pace speeds and feed will continue to hold their place in our psyche but not as you know it. I explore the new direction for speeds and feeds in this blog.
If you are a Juniper partner, I hope you saw the recent announcement of Partner Premium Enablement – PPE for short. This new program gives Partner Support Specialists extra value that you can sell to your customers to help them grow, evolve and strengthen their networks. And you will certainly want to make sure your customers watch this video describing how important partners are throughout the entire networking life
The war between law enforcement and cyber crime has evolved dramatically in the past decade. Law enforcement tries to find new ways to track down criminals, while criminals try to find new ways to evade law enforcement.
My story to get certified in Juniper, this was a mixed combination of failure and success.
In 2010 I got the opportunity to work as a Juniper partner, where certification is essential to introduce yourself. However I had done Cisco certification before I started my professional carrier so I had no focus to work and certify in Juniper. At that time I had taken three certification exams (JNCIA-Junos, JNCIA-ER, and JNCI
The transformation of DevOps practices into network operations (NetOps) is not as straightforward as the adoption of DevOps practices in the virtualized server environment. The rigid operational environments and resource limitations on network devices make it much harder to carve out a test network from a production network than it is to spin up test virtual machines (VMs) on a production compute server. Despite thes
Private clouds are transforming IT organizations and an increasing number of enterprises are embracing the opportunities cloud computing provides. For those companies looking to embark on a journey to the cloud, Jonathan Davidson’s session entitled, “Lock In. Or Look Forward.” addressed how companies can avoid vendor lock-in when choosing a cloud infrastructure vendor; the value of openness, intelligence and best-i
Human trafficking has become one of the world’s most lucrative and despicable criminal enterprises, and the San Francisco Bay Area is a known hotspot. Because relatively little is known about the nature and scope of the problem in Silicon Valley, Juniper Networks Foundation Fund and Silicon Valley Community Foundation partnered to commission a first-of-its-kind study of human trafficking in the two-county region. T
There are barbwires, blockades, mine fields, and serious military presence at this 4-kilometer wide, 250-kilometer long strip fo DMZ between the two Koreas, to make sure that there is no unwanted trespassing. But since the 1970s, 4 underground infiltration tunnels have been discovered that went under the DMZ from North Korea to South Korea. Perimeter-based security is like the DMZ but you also need to prevent the dam
As a Chief Information Security Officer, I get a lot of questions about the cyber security threats and what worries me most. I field questions about Anonymous, geo-political hackers, cyber-extortionists, malware, and the like.
I’ve written before about how SDN and NFV will be catalysts for huge amounts of change and benefits in the telecoms industry. From a network infrastructure perspective SDN and NFV will most likely be one of the biggest changes I’ll see during my career. Though, recent comments from Deutsche Telekom highlight some of the risks from moving to NFV showing that we are probably past the peak of expectation and entering th