Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements

Microsoft released an out-of-band update, MS14-068, yesterday to patch a critical bug in its Kerberos implementation. This bug could allow a remote, unprivileged, authenticated attacker to elevate their privileges to that of any other domain user. Such an attack could also enable the attacker to obtain domain administrator privileges and completely compromise the security restrictions enforced on the targeted domain.

Read more...

prashantk

November 2014 Microsoft Patch Tuesday Summary

by Juniper Employee ‎11-11-2014 09:22 PM - edited ‎11-11-2014 09:27 PM

Welcome to the November edition of Microsoft Patch Tuesday Summary. In this edition there are 14 updates; four are marked "Critical", eight are rated "Important" and two are rated "Moderate”. A total of 33 CVE's (Common Vulnerability and Exposure) were fixed over 14 bulletins this month. One of the Critical update MS14-064 addresses Sandworm related attack CVE-2014-6352 which was seen being exploited in the wild.

 

Here is a list of Security bulletins which were rolled out in today's Patch Tuesday release.

 

 

Read more...

Cowritten by Mark Belk, National Government Chief Architect and Rebecca Lawson, Senior Director Security

   

SecIntel_Imprative_GIS

 

The pace of change seen in the adoption of new methods and technology deployed by nefarious characters in cyberspace continues to place new demands on government information systems. There are multiple persistent cybersecurity threats targeting governments, critical infrastructure, economic institutions and commercial property. The government has recognized these threats. In fact, the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) program increases network defense through the modernization of information system infrastructure.

Read more...

Blog image II.jpgThe war between law enforcement and cyber crime has evolved dramatically in the past decade. Law enforcement tries to find new ways to track down criminals, while criminals try to find new ways to evade law enforcement.

Read more...

As a Chief Information Security Officer, I get a lot of questions about the cyber security threats and what worries me most. I field questions about Anonymous, geo-political hackers, cyber-extortionists, malware, and the like.

Read more...

It’s Microsoft Patch Tuesday! In the October edition there are 8 updates; three are marked "Critical" and five are rated "Important". A total of 24 vulnerabilities were fixed over 8 bulletins this month. One of the Critical update MS14-056 is an all version Internet Explorer (IE 6 to 11) patch. This single update resolves 14 CVE's (Common Vulnerability and Exposure).

Read more...

KyleAdams

Safeguarding cloud security before it’s too late

by Juniper Employee ‎10-14-2014 12:34 PM - edited ‎10-15-2014 11:09 AM

vault.pngEarlier this month, many of the world’s biggest cloud-service providers quietly cooperated to update the open-source Xen hypervisor software. What wasn’t publicly revealed until after the update was safely completed, however, was that it actually was a carefully coordinated operation intended to head off a major security breach, as identified in the Xen patch advisory.

Read more...

The moment personal photos of Jennifer Lawrence, Kim Kardashian and other celebrities were leaked from iCloud it became global breaking news and suddenly everyone had questions and opinions about cloud security.

Read more...

NCSAM2014.png

Serious concerns have emerged in the past several years about the integrity and trustworthiness of IT products and the ability of an adversary to compromise or insert vulnerabilities into IT products through infiltration of the supply chain. In particular, federal and critical IT customers have expressed concerns about adversaries intercepting products while in transit and reselling or hacking them. 

Read more...

skathuria

Marrying the Firewall with the Threat Intelligence You Need

by Juniper Employee ‎10-08-2014 02:27 PM - edited ‎10-08-2014 03:45 PM

threatintelligence.pngTo avoid becoming the next victim in the long line of data breach impacted organizations, many have started using a diverse and wide array of threat intelligence sources such as honeypots, social media monitoring, malware reverse engineering approaches, or others, as described by Anton Chuvakin in this blog.

Read more...

The age of Internet of Things (IoT) is upon us, which enables greater connectivity that goes well beyond the common use of smartphones, tablets, and PCs.

Read more...

The move to the cloud has seen a rise in the complexity and number of cyber attacks. To help deal with this problem, Juniper Networks SRX firewall series has become far more powerful. An Adaptive Intelligent Firewall with features that goes beyond the capabilities of todays much touted Next Generation Firewall (NGFW).

Read more...

Christofer Hoff

Focus.

by Juniper Employee on ‎10-02-2014 06:30 AM

In today's ever-changing IT security landscape, focused execution is critical.

Read more...

About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.