Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Rapid Response: The WannaCry Ransomware Outbreak

by Juniper Employee ‎05-13-2017 08:48 AM - edited ‎05-17-2017 03:33 PM

JuniperSkyATP.png

A new strain of self-replicating ransomware is affecting computers all over the world that is known by various names: Wanna, WannaCry or Wcr.  This malware is disrupting companies and services for businesses, governments and consumers.

 

The information that we have at the time of writing seems to indicate that the initial point of infection within most organizations is via traditional mechanisms, primarily email and web-delivered PDF's sourced from the Necurs botnet. The novelty of WannaCry is of course its ability to break out from the initial “Patient Zero” and propagate laterally across an SMBv1-enabled network in rapid fashion.

Read more...

SRX talk(s)

by Distinguished Expert ‎05-01-2017 07:25 AM - edited ‎05-05-2017 07:53 AM

SRX-BLOG.png

Three weeks ago (or a bit more depending on when you’re reading this blog) I was attending a course at Juniper's EMEA HQ in Amsterdam, together with my friend Valentijn. Ayman was teaching us about SDN in the WAN, Northstar functionality and a variety of other topics. Nice stuff to learn about. Then an e-mail arrived, sorry Ayman, I shouldn’t have read it because it distracted my attention for quite a while. Blame it on Washid, because he sent me the release notes on Junos 15.1X49-D80.4. After first glance at the release notes I couldn’t stop reading and smiling.

Read more...

Keyboard-Grenade.jpg

If you’re looking for evidence in the public domain that any government has admitted to targeting another government’s civilian or military digital infrastructure - you won’t find much, for obvious reasons. To date, almost all official rhetoric has been about defending citizens and infrastructure against foreign states, but that is changing. In 2017 I believe we will see more nations move the narrative from one of passive defence, to one of a more active stance. 

Read more...

Juniper Networks SRX4000 line of next-generation firewalls set a new benchmark for price and performance while enabling secure migration into hybrid clouds

 

As enterprises grow more dependent on cloud technologies, they need to begin adopting hybrid cloud architectures to provide greater flexibility and economic benefits. This, however, is easier said than done.

 

Migrating to a hybrid cloud model and deploying point firewalls presents its own set of challenges, including:

 

• Performance degradation at scale impacting security effectiveness

• Complex security management

• Weak connectivity between data centers

• Increased risk surface

 

Unfortunately, point and legacy firewalls are poorly suited for hybrid cloud environments, creating an immediate need for solutions that can provide:

 

  • Faster threat detection and blocking: Fully integrated, cloud-informed threat prevention (such as Juniper Networks Sky Advanced Threat Prevention) offers immediate, actionable intelligence; scalability; and integrated security services that keep you up to date and defend against the very latest threats.
  • Effective security everywhere: An architecture powered by Juniper’s Software-Defined Secure Network (SDSN) platform lets enterprises easily implement and efficiently operate their security infrastructure. An ecosystem that is continually learning about new threats enables faster enforcement and consistent security across your hybrid cloud environment, keeping costs down.
  • Flexible and scalable architecture: Building secure environments across private and public cloud data centers helps you keep your network running, delivering resiliency, high-performance NGFW functionality, complete application visibility and control, and effective threat defense.
  • Smarter control and visibility: Intuitive, scalable management tools and analytics provide actionable intelligence that empowers teams to do more with fewer resources, keeping operational costs down.
  • Industry-leading, high-performance NGFWs: Juniper’s efficient and effective physical and virtual SRX Series NGFWs optimize security, allowing you to easily implement defenses and operate them more efficiently without compromising performance.

 

An effective hybrid cloud solution, working along with high-performance physical and virtual next-generation firewalls deployed in private and public data centers, provides business resiliency, visibility and control, analytics, and automation—all of which help enterprises reduce business risk and focus on business critical problems.

 

A Software-Defined Secure Network builds threat detection, enforcement, and remediation into the very fabric of your network. Powered by Juniper’s high-performance NGFWs, along with smarter and faster application visibility and control, the Juniper hybrid cloud security architecture provides flexible, end-to-end security, allowing enterprises to protect their data within private and public data centers, campuses, or regional headquarters.

 

To learn more about Juniper Networks SRX Series NGFWs and how Juniper’s security solutions seamlessly extend across private and public cloud architectures without compromising performance and manageability, please download our Securing Enterprise Hybrid Clouds solution brief.

 

To learn more about SRX4000 Services Gateways please visit SRX4000 Services Gateways.

F-117_Nighthawk_Front.jpg

Stealth – the art of remaining hidden - has been a force of nature since before the dawn of mankind. Long before we were standing upright on the Savannah, nature had already figured out that one great way of staying alive was to remain silent, hidden out of sight and with the wind in your face as you watch your prey. As in nature, the art of remaining hidden continues to evolve for the cybercriminal, as well.

Read more...

popcorn.JPG

For many years now, criminal gangs have stolen money from banks. It used to appear to be a lot more interesting. It used to be a lot scarier. It used to involve men in striped jumpers rushing into vaults with huge bags marked ‘swag’ and some edge-of-the-seat fast get-aways – using horses, vans, cars and even speed boats. Recently it has seemed to appear as rather dull. Of late, it has become a tale of mysterious, unseen people behind keyboards and screens.

Read more...

Whenever we read about breaches, hacks, or denial-of-service attacks – they are always carried out with a common aim: either to gain or prevent access to personal or corporate information. Data has value – whether it’s a website’s ability to sell and ship products, or the photographs from your once-in-a-lifetime holiday, hackers will look to exploit the fact that someone needs or wants that data and this is why in 2016 we saw a 50% increase in ransomware attacks.

Read more...

Could Smart-City malware be spread via motorways and highways?

by Juniper Employee ‎03-24-2017 02:00 AM - edited ‎04-12-2017 04:59 AM

Scurvygrass(Danish)_2011_03_29_WestKirby_HilbreIsland_Hoylake_027p50.jpg

 

 In recent years we have seen news reports of wildflowers and weeds being 'spread' by the wind-tunnel effect of cars on our motorways and highways, is there a potential for malware to spread between smart cities in the same way?

 

If you enjoyed reading this blog and would like to read related security blogs please visit here

Read more...

The first connected car could be taken for ransom

by Juniper Employee ‎03-20-2017 02:00 AM - edited ‎04-12-2017 04:59 AM

 

sedan3.png

 

 In my last blog, I discussed how a supply chain attack could affect the business – and brand –of a global company. This week, we’re going to take this a level down and consider something else which I believe could be a threat - the intelligence that is being built into our cars.

 

If you enjoyed reading this blog and would like to read related security blogs please visit here

Read more...

car-key-tallahassee.png

 

 In my last blog I discussed the risks associated with IoT. If we look at information technology progress in the last 25 years, it seems that malware or data-theft quickly follows major technology milestones. As much as we like to see technology innovation, hackers are are also finding new business opportunities.

 

If you enjoyed reading this blog and would like to read related security blogs please visit here

Read more...

Security Prediction 3: DDoS via IoT – the first wave of attacks?

by Juniper Employee ‎03-02-2017 01:00 AM - edited ‎04-12-2017 04:57 AM

wave.jpg

 In the last year, we’ve all heard of the Mirai malware, but did you know that Mirai is Japanese for ‘the future’? And that’s what I believe we are seeing: The future of cyber-attacks.

 

 

If you enjoyed reading this blog and would like to read related security blogs please visit here

Read more...

 

Juniper Networks demonstrates continued commitment to the Common Criteria/National Information Assurance Partnership (NIAP) certification program. 

Read more...

Will the Enterprise Welcome Connected Devices?

by Juniper Employee ‎02-23-2017 01:00 AM - edited ‎04-12-2017 04:56 AM

IoTSecurity.jpg

IoT is everywhere. There are around 15 billion connected devices in the world today. Putting it bluntly, that equals billions of opportunities to launch a cyber-attack. I’m sure we all saw the news at the end of 2016 when IoT cameras were infected with the Mirai malware and turned into ‘bots that were used to disable websites and Internet services.

 

Will 2017 be the year we hear of the first attack where IoT is used to steal corporate data?

 

If you enjoyed reading this blog and would like to read related security blogs please visit here

Read more...

techies_Finalist_logos_Security Technology Finalist.png

 

 

 

Sky ATP has been shortlisted for the techies 2017 awards in London, read on to find out more...

 

 

 

Read more...

technology-background-1632715-1599x1068.jpg

Just three years ago, the concept of IoT (Internet of Things) was still fresh; people bought devices because they were ‘cool’ or because it seemed that we could improve quality of life with ownership. The general excitement around IoT has led to market consumerisation faster than security standards have kept pace. 

 

In this blog we will discuss growth in IoT, and the risk of not considering security during design, purchase and implementation of these exciting devices.

 

If you enjoyed reading this blog and would like to read related security blogs please visit here

Read more...

About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon


Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Announcements
Juniper TechCafe Ask the Author
Labels