Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

How your Boss can put a Dollar Sign on your Cyber Security Policy

by Chris vant Hof ‎06-12-2015 04:05 AM - edited ‎06-12-2015 05:05 AM

This is a guest blog post. Views expressed in this post are original thoughts posted by Chris van ‘t Hof of Tek Tok. These views are his own.


Perhaps you are one of the people who suspect hackers are knocking on the digital doors of your organization. You are probably right. But have you ever tried to convince your management team that your organization should spend more on cyber security measures? If you are a Chief Information Security Officer, you probably have to, even though it is the worst part of your job. If your organization has never been hacked, you have either done your job well, or just got lucky, but no one sees the need for improvements. Crying “cyber apocalypse is near” will only help for a while. Claiming they will just have to trust you on this one too. And in the event your organization finally is hacked, you are to blame it’s to late…


101 to Cyber Information Sharing

by Juniper Employee on ‎05-27-2015 03:27 AM

The emergence of the cyber threat phenomenon is forcing organizations to change how they think about security in many ways. One of these changes refers to organizations’ policy on sharing cyber related information with outside parties, while creating a collaborative effort to fight the cyber war. Such sharing, represents a shift in the legacy information technology paradigm of security silos, and creates a complex, multifaceted challenge to technology, law, organizational culture, privacy and even politics.


Sharing organizational cyber information is the communication of information regarding an organization’s security to an external party that results in gain for the sharing and receiving party alike. The challenges posed by innovative attack methods, such as the Advanced Persistent Threat (APT), reduce the effectiveness of traditional security mechanisms. To a certain extent, an inter-organizational cyber information sharing infrastructure can help the identification of an attack or attacker in a given organization, and once mitigated the details of the attack and/or the inoculation can be distributed to other organizations to help prevent similar attacks.



Serious concerns have emerged in the past several years about the integrity and trustworthiness of IT products and the ability of an adversary to compromise or insert vulnerabilities into IT products through infiltration of the supply chain. In particular, federal and critical IT customers have expressed concerns about adversaries intercepting products while in transit and reselling or hacking them. 


Cyber Security Challenge UK Masterclass – Juniper was there and it was awesome!

by Juniper Employee ‎03-18-2014 07:32 AM - edited ‎03-18-2014 10:47 AM

If you have seen, listened or read any of the UK (or much of the international) press of the last few days you could not have failed to notice the coverage of the 2014 Cyber Security Challenge UK Masterclass. Juniper was there and this is what happened...




Last week the Cyber Security Challenge Masterclass got a step closer when organisers completed a dry run with volunteer contestants – all sworn to secrecy.


A Cyber Attack on UK PLC!

by Juniper Employee ‎03-06-2014 05:08 AM - edited ‎03-06-2014 05:22 AM

Scary thought isn’t it? But it is a real danger facing the UK and its citizens and it’s taken as seriously by government agencies as conventional terrorism.


About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Juniper Networks Technical Books