Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements

Trusted Computing Group and Juniper

by gfedorkow ‎07-06-2015 08:40 AM - edited ‎07-16-2015 02:57 PM

The Trusted Computing Group held one of its Members meetings June 16-18 in Edinburgh, UK, and I was pleased to be able to attend, to participate in the work of the Technical Committee.

 

While TCG has quite a few activities in play, the group is best known for development of the Trusted Platform Module (TPM), a function often implemented as a small chip that serves as a “Root of Trust” for all sorts of devices that incorporate computers, ranging from phones to laptops to Internet-scale routers, offering assurance that software loaded on the device is authorized and authentic, and that machines protected by TCG technology are resistant to so-called Advanced Persistent Threats, or various kinds of attacks that cause the device to run code modified by attackers.

Read more...

Whack-a-Hacker

by Juniper Employee ‎06-24-2015 05:00 AM - edited ‎06-29-2015 11:00 AM

JUN15154_Security_infographic_062615.jpg.jpegBeing a security professional these days may seem to some like a never ending game of Whack-a-Mole. Once one problem, vulnerability or intrusion is taken care of, it seems inevitable that another problem pops up that needs whacking into submission. 

Read more...

How your Boss can put a Dollar Sign on your Cyber Security Policy

by Chris vant Hof ‎06-12-2015 04:05 AM - edited ‎06-12-2015 05:05 AM

This is a guest blog post. Views expressed in this post are original thoughts posted by Chris van ‘t Hof of Tek Tok. These views are his own.

 

Perhaps you are one of the people who suspect hackers are knocking on the digital doors of your organization. You are probably right. But have you ever tried to convince your management team that your organization should spend more on cyber security measures? If you are a Chief Information Security Officer, you probably have to, even though it is the worst part of your job. If your organization has never been hacked, you have either done your job well, or just got lucky, but no one sees the need for improvements. Crying “cyber apocalypse is near” will only help for a while. Claiming they will just have to trust you on this one too. And in the event your organization finally is hacked, you are to blame it’s to late…

Read more...

When I first picked up the latest RAND research report, I did my 30 second scan of the table of contents and noticed a range of familiar topics: High cost of cyber security. Too much technology, not enough security. And, there's no silver bullet when it comes to security.

 

Nothing new here, or so I thought.

Read more...

RAND ReportWhen it comes to cybersecurity, the industry has always struggled to understand the complexities that influence the true cost of security risks to businesses. As a chief information security officer (CISO), I’m faced with these multifaceted dilemmas daily and, just like others in the industry, struggle to determine the best security investments to protect a company’s valuable assets. Realistically, how can I predict what the landscape will look like five or 10 years down the road, or even, a week from now?

Read more...

The emergence of the cyber threat phenomenon is forcing organizations to change how they think about security in many ways. One of these changes refers to organizations’ policy on sharing cyber related information with outside parties, while creating a collaborative effort to fight the cyber war. Such sharing, represents a shift in the legacy information technology paradigm of security silos, and creates a complex, multifaceted challenge to technology, law, organizational culture, privacy and even politics.

 

Sharing organizational cyber information is the communication of information regarding an organization’s security to an external party that results in gain for the sharing and receiving party alike. The challenges posed by innovative attack methods, such as the Advanced Persistent Threat (APT), reduce the effectiveness of traditional security mechanisms. To a certain extent, an inter-organizational cyber information sharing infrastructure can help the identification of an attack or attacker in a given organization, and once mitigated the details of the attack and/or the inoculation can be distributed to other organizations to help prevent similar attacks.

Read more...

vSRX Virtual Firewall

Virtual security appliances have arrived. And they’re catching on at a fast and furious rate. Whereas today 95 percent of enterprises have physical security devices deployed, by 2017 that slips to just 54 percent while enterprises deploying virtual security appliance rises to 80 percent, according to Infonetics.

 

Read more...

April 2015 Microsoft Patch Tuesday Summary

by Juniper Employee ‎04-14-2015 11:25 PM - edited ‎04-14-2015 11:26 PM

Welcome to the April edition of Microsoft Patch Tuesday Summary. In this edition there are 11 updates; 4 are marked "Critical" and 7 are rated "Important".  A total of 26 CVE's (Common Vulnerability and Exposure) were fixed over 11 bulletins this month. One of the Critical update MS15-033 addresses publicly disclosed Microsoft Office vulnerability (CVE-2014-6352) which is currently being exploited in the wild.

Read more...

The SRX makes tunnel control better and easier

by Juniper Employee ‎04-09-2015 02:03 PM - edited ‎04-09-2015 03:13 PM

Juniper SRX Makes Tunnel Control BetterAre you doing everything you can to control unauthorized traffic entering and leaving your network?

Read more...

There is a lot of focus these days in the US Congress and in the Administration on the topic of cyber information sharing. While it is important to elevate the dialogue about cybersecurity preparedness, protection, and resilience to a sustained national level, we must also not fall into the trap of thinking that the work is done by simply improving the exchange of cyber threat and vulnerability information.

Read more...

7,617 Tests Later, and Juniper’s Firewall Stops Threats Better

by Trusted Contributor ‎03-18-2015 06:25 PM - edited ‎04-02-2015 02:25 PM

How well does your IPS stack up?  We decided to do some in-house testing, to see how our firewall solutions measured up against some of our competitors in terms of detecting and stopping attacks. The results are something that you may find interesting.  

Read more...

Colocation and hosting managed service providers (MSPs) are under extreme pressure these days. Commoditization has driven margins down, causing considerable jockeying for position as MSPs try to differentiate themselves in an increasingly saturated market.

 

Read more...

Security ain't easy, but it can be fast.

by Juniper Employee ‎03-12-2015 09:00 AM - edited ‎03-18-2015 12:17 PM

No way around it -- network security is hard work.

Read more...

Say goodbye to the network performance/security dilemma

by Juniper Employee ‎03-11-2015 10:11 AM - edited ‎03-24-2015 02:45 PM

Tired of security solutions that can’t keep up with the speed of your network—much less the speed of your business? Then you’ll love what Express Path has to offer.

Read more...

About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Michael Callahan
Vice President
Marketing

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Labels
Copyright© 1999-2015 Juniper Networks, Inc. All rights reserved.