Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

techies_Finalist_logos_Security Technology Finalist.png




Sky ATP has been shortlisted for the techies 2017 awards in London, read on to find out more...






Just three years ago, the concept of IoT (Internet of Things) was still fresh; people bought devices because they were ‘cool’ or because it seemed that we could improve quality of life with ownership. The general excitement around IoT has led to market consumerisation faster than security standards have kept pace. 


In this blog we will discuss growth in IoT, and the risk of not considering security during design, purchase and implementation of these exciting devices.




Networks have changed significantly over the past decade.  Businesses are moving to the cloud and adopting new technologies such as Internet of Things (IoT) and block chain, all of which are heavily network-dependent.


These same enterprises are also spending more on security to protect new and existing infrastructure.  Unfortunately, breaches continue unabated.  Internal records and customer data are being stolen and sold to the highest bidder, causing irreparable damage. This begs the question:  are these businesses missing something fundamental in their approach to network security?


Juniper extends SDSN eco system with leading CASBs, CipherCloud and Netskope


For the past 25 years, organizations of all sizes have relied on the castle and moat protection model – multiple layers of security with the ability to ‘raise the drawbridge’ as a last line of defense. Today, the castle is under siege from all sides and the bridge and moat model has run its course. Today’s networks are extremely complex, but like the castle they are equally simple in foundation: routers, switches and firewalls are the primary building blocks – whether physical or virtual. And like the castle that can no longer keep up with new kinds of foes, network attacks are increasing in complexity, agility and the ability to do damage.


RSA is right around the corner and we’re excited to be back in San Francisco at Moscone Center for another week of security discussions and the opportunity to showcase our latest security innovations. Every year, RSA offers a great opportunity to assess the current security landscape and re-devote ourselves to Juniper’s goal of providing Software-Defined Secure Networks (SDSN) that stop and prevent threats from both inside and outside the perimeter. We have a lot of exciting activities taking place at the conference, so allow me to break down all the highlights of Juniper’s participation.



Recent focus in cybersecurity has been how to remain ahead of advanced attacks. Whilst this is important, 2016 proved that many organisations had missed fundamental security controls with ransomware seeping through email gateways, weak passwords in use on critical systems, users able to access data, files and systems across their internal networks, out of date security software, poor patch management controls, low use of encryption with data being stored in clear text – the list goes on and on. Why?


This series of articles will go into detail on network issues and predictions which we see on the horizon for the coming year. Please read on for a high-level overview of what you can look forward to...


Shamoon Returns

by Juniper Employee ‎12-14-2016 08:52 PM - edited ‎12-15-2016 10:47 AM

Over the past month, we've seen the reemergence of the Shamoon malware, primarily affecting businesses in Saudi Arabia. We'll take a look at a recent Shamoon sample to see how it works and how Sky ATP's deep analysis engines catch it.


The Thing is… How do we keep botnets at bay?

by Juniper Employee ‎12-12-2016 03:27 AM - edited ‎12-12-2016 12:18 PM

Here’s my number of the week… Actually, two numbers of the week.


The first is 20 billion. The second is 1.5 million.


The first is an estimate, widely reported in the media, of how many IoT devices are likely to be connected to the internet by 2020(1)… although it could actually be double this.


Journey to Securing Public and Hybrid Cloud Deployments

by Juniper Employee ‎11-29-2016 07:55 AM - edited ‎11-30-2016 08:47 AM

Screen Shot 2016-11-30 at 8.44.39 AM.png


Everyone agrees: IT infrastructure has, for the last several years, been migrating inexorably toward the cloud. When did that long journey start? How far have we come? And how much further do we have to go? Let’s take a look back at the history of the cloud.


BlackNurse in review: Is your NGFW vulnerable?

by Juniper Employee ‎11-28-2016 12:15 PM - edited ‎12-02-2016 06:30 AM

On November 10th, 2016, Danish firm TDC published a report about the effects of a particular ICMP Type+Code combination that triggers resource exhaustion issues within many leading Firewall platforms. The TDC SOC has branded this low-volume attack BlackNurse, details of which can be seen here, and here


"This is the best article and test we have to date on the BlackNurse attack. The article provides some answers which are not covered anywhere else. The structure and documentation of the test is remarkable. It would be nice to see the test performed on other firewalls – good job Craig ” 

Lenny Hansson and Kenneth Bjerregaard Jørgensen, BlackNurse Discoverers


Against the background of a thriving digital economy, it’s evident just how many of the technologies we rely on today are going to be a big part of our interconnected future. Yet, in just a few short years, much of what we now take for granted could change beyond recognition and in ways few of us might have predicted.



Continuing on with our series, this particular post will revolve around "Security Information and Event Management" solutions (SIEM's), their place in the Enterprise, and how you can leverage their exceptional levels of visibility within SkyATP. 


A Walk Through AutoIT Malware

by Juniper Employee ‎11-15-2016 02:08 PM - edited ‎12-15-2016 01:58 PM

In this post, we'll walk through the analysis of a piece of AutoIT malware. AutoIt is a scripting language and interpreter mainly used for Windows administration and task automation. Malware written in AutoIT is not particularly common, though there was a recent Locky clone built using the language. We'll step through three different layers to find the final malicious payload.


About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Jennifer Blatnik
Vice President
Enterprise Portfolio Marketing

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe


Juniper Innovators Circle