Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Scurvygrass(Danish)_2011_03_29_WestKirby_HilbreIsland_Hoylake_027p50.jpg

 

 

In recent years we have seen news reports of wildflowers and weeds being 'spread' by the wind-tunnel effect of cars on our motorways and highways, is there a potential for malware to spread between smart cities in the same way?

Read more...

 

sedan3.png

 

 

In my last blog, I discussed how a supply chain attack could affect the business – and brand –of a global company. This week, we’re going to take this a level down and consider something else which I believe could be a threat - the intelligence that is being built into our cars.

Read more...

car-key-tallahassee.png

 

 

In my last blog I discussed the risks associated with IoT. If we look at information technology progress in the last 25 years, it seems that malware or data-theft quickly follows major technology milestones. As much as we like to see technology innovation, hackers are are also finding new business opportunities.

Read more...

Security Prediction 3: DDoS via IoT – the first wave of attacks?

by Juniper Employee ‎03-02-2017 01:00 AM - edited ‎03-06-2017 06:54 PM

wave.jpg

 In the last year, we’ve all heard of the Mirai malware, but did you know that Mirai is Japanese for ‘the future’? And that’s what I believe we are seeing: The future of cyber-attacks.

Read more...

 

Juniper Networks demonstrates continued commitment to the Common Criteria/National Information Assurance Partnership (NIAP) certification program. 

Read more...

IoTSecurity.jpg

IoT is everywhere. There are around 15 billion connected devices in the world today. Putting it bluntly, that equals billions of opportunities to launch a cyber-attack. I’m sure we all saw the news at the end of 2016 when IoT cameras were infected with the Mirai malware and turned into ‘bots that were used to disable websites and Internet services.

 

Will 2017 be the year we hear of the first attack where IoT is used to steal corporate data?

Read more...

techies_Finalist_logos_Security Technology Finalist.png

 

 

 

Sky ATP has been shortlisted for the techies 2017 awards in London, read on to find out more...

 

 

 

Read more...

technology-background-1632715-1599x1068.jpg

Just three years ago, the concept of IoT (Internet of Things) was still fresh; people bought devices because they were ‘cool’ or because it seemed that we could improve quality of life with ownership. The general excitement around IoT has led to market consumerisation faster than security standards have kept pace. 

 

In this blog we will discuss growth in IoT, and the risk of not considering security during design, purchase and implementation of these exciting devices.

Read more...

 

SDSN_LOGO_V10_TRIMMED.png

Networks have changed significantly over the past decade.  Businesses are moving to the cloud and adopting new technologies such as Internet of Things (IoT) and block chain, all of which are heavily network-dependent.

 

These same enterprises are also spending more on security to protect new and existing infrastructure.  Unfortunately, breaches continue unabated.  Internal records and customer data are being stolen and sold to the highest bidder, causing irreparable damage. This begs the question:  are these businesses missing something fundamental in their approach to network security?

Read more...

Juniper extends SDSN eco system with leading CASBs, CipherCloud and Netskope

Read more...

For the past 25 years, organizations of all sizes have relied on the castle and moat protection model – multiple layers of security with the ability to ‘raise the drawbridge’ as a last line of defense. Today, the castle is under siege from all sides and the bridge and moat model has run its course. Today’s networks are extremely complex, but like the castle they are equally simple in foundation: routers, switches and firewalls are the primary building blocks – whether physical or virtual. And like the castle that can no longer keep up with new kinds of foes, network attacks are increasing in complexity, agility and the ability to do damage.

Read more...

RSA is right around the corner and we’re excited to be back in San Francisco at Moscone Center for another week of security discussions and the opportunity to showcase our latest security innovations. Every year, RSA offers a great opportunity to assess the current security landscape and re-devote ourselves to Juniper’s goal of providing Software-Defined Secure Networks (SDSN) that stop and prevent threats from both inside and outside the perimeter. We have a lot of exciting activities taking place at the conference, so allow me to break down all the highlights of Juniper’s participation.

Read more...

Juniper Networks Security Issues & Predictions (for 2017)

by Juniper Employee ‎02-08-2017 05:34 AM - edited ‎03-20-2017 03:32 AM

Cam.png

Recent focus in cybersecurity has been how to remain ahead of advanced attacks. Whilst this is important, 2016 proved that many organisations had missed fundamental security controls with ransomware seeping through email gateways, weak passwords in use on critical systems, users able to access data, files and systems across their internal networks, out of date security software, poor patch management controls, low use of encryption with data being stored in clear text – the list goes on and on. Why?

 

This series of articles will go into detail on network issues and predictions which we see on the horizon for the coming year. Please read on for a high-level overview of what you can look forward to...

Read more...

Shamoon Returns

by Juniper Employee ‎12-14-2016 08:52 PM - edited ‎12-15-2016 10:47 AM

Over the past month, we've seen the reemergence of the Shamoon malware, primarily affecting businesses in Saudi Arabia. We'll take a look at a recent Shamoon sample to see how it works and how Sky ATP's deep analysis engines catch it.

Read more...

About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon


Our Bloggers

Jennifer Blatnik
Vice President
Enterprise Portfolio Marketing

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Announcements

Juniper Design & Architecture Center - Mobile Cloud
Labels