Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

According to a 2014 report from the ICS-CERT, industrial control systems in the United States were threatened by cyber-attacks at least 245 times over a 12-month period by nation-state hackers, cybercriminals, cyber terrorists and hacktivists. The potential risk to critical infrastructure is real and it’s important that the public and private sector work collectively to protect these critical systems.

Read more...

Twenty-four hours. That’s all it took for an 18-year-old to exploit two day-zero bugs in iOS 10 and jailbreak an iPhone. As an iPhone user, I’ve always appreciated what Apple does for us – provides a reasonable (and to most imperceptible) decrease in file access between applications, which yields significant benefits in security. However, the recent iOS exploit illustrates that even the “safest” devices are not immune to the hacking culture we live in today. 

Read more...

The idea of a lone hacker maliciously tapping away in a dark room is an antiquated one. The business of cybercrime is now a multibillion-dollar enterprise with highly organized entities looking to exploit vulnerabilities and scam businesses and consumers in our increasingly networked world. According to a Juniper commissioned report from the RAND Corporation:

 

The cyber black market has evolved from a varied landscape of discrete, ad hoc individuals into a network of highly organized groups, often connected with traditional crime groups (e.g., drug cartels, mafias, terrorist cells) and nation-states. It does not differ much from a traditional market or other typical criminal enterprises; participants communicate through various channels, place their orders, and get products.

 

Today, attackers are much more efficient in their efforts than ever before, driven by the ability to work with others in the criminal underground. Left unchecked, I worry that the ability to defend against these organizations will be more challenging.

Read more...

Improving Cybersecurity - Back To Basics

by Juniper Employee ‎10-03-2016 09:00 AM - edited ‎10-03-2016 01:21 PM

In recent years, high profile cyber events such as the Office of Personnel Management (OPM) data breach and the SONY hack have received significant public and media attention, which in turn has increased the level of attention given to larger issues of cybersecurity. With such attention, it is easy to understand why government officials and many others continue to focus on the consequences of major cybersecurity events.

Read more...

We are amidst an ongoing transformation. One in which the benefits can outweigh the challenges, but awareness, education and following basic best practices that are embedded within daily activities are critical to protecting oneself and reducing the possibility of a breach.

Read more...

Eight Ways to Heighten Cybersecurity

by Juniper Employee on ‎10-01-2015 06:00 AM

As our world has become ever more connected, we’ve all learned common online safety tips. It’s now second nature to use strong passwords and antivirus software; take care when connecting to public Wi-Fi; and remain alert to social engineering scams (e.g., phishing).

Read more...

Security Intelligence Imperative for Government Information Systems

by Juniper Employee ‎10-31-2014 11:57 AM - edited ‎10-31-2014 02:17 PM

Cowritten by Mark Belk, National Government Chief Architect and Rebecca Lawson, Senior Director Security

   

 

The pace of change seen in the adoption of new methods and technology deployed by nefarious characters in cyberspace continues to place new demands on government information systems. There are multiple persistent cybersecurity threats targeting governments, critical infrastructure, economic institutions and commercial property. The government has recognized these threats. In fact, the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) program increases network defense through the modernization of information system infrastructure.

Read more...

The war between law enforcement and cyber crime has evolved dramatically in the past decade. Law enforcement tries to find new ways to track down criminals, while criminals try to find new ways to evade law enforcement.

Read more...

As a Chief Information Security Officer, I get a lot of questions about the cyber security threats and what worries me most. I field questions about Anonymous, geo-political hackers, cyber-extortionists, malware, and the like.

Read more...

Safeguarding cloud security before it’s too late

by KyleAdams ‎10-14-2014 12:34 PM - edited ‎10-15-2014 11:09 AM

Earlier this month, many of the world’s biggest cloud-service providers quietly cooperated to update the open-source Xen hypervisor software. What wasn’t publicly revealed until after the update was safely completed, however, was that it actually was a carefully coordinated operation intended to head off a major security breach, as identified in the Xen patch advisory.

Read more...

The moment personal photos of Jennifer Lawrence, Kim Kardashian and other celebrities were leaked from iCloud it became global breaking news and suddenly everyone had questions and opinions about cloud security.

Read more...

Serious concerns have emerged in the past several years about the integrity and trustworthiness of IT products and the ability of an adversary to compromise or insert vulnerabilities into IT products through infiltration of the supply chain. In particular, federal and critical IT customers have expressed concerns about adversaries intercepting products while in transit and reselling or hacking them. 

Read more...

The age of Internet of Things (IoT) is upon us, which enables greater connectivity that goes well beyond the common use of smartphones, tablets, and PCs.

Read more...

Four Ways to Stay Safe Online

by Juniper Employee ‎10-01-2014 01:06 PM - edited ‎10-02-2014 02:28 PM

Don't get spooked by cyber threats...October might be more commonly known for football, Halloween and kids trick-or-treating, but in the U.S. it is also National Cyber Security Awareness Month

 

Read more...

About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon


Our Bloggers

Jennifer Blatnik
Vice President
Enterprise Portfolio Marketing

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Announcements

Juniper Innovators Circle
Labels