Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Latest Articles
How your Boss can put a Dollar Sign on your Cyber Security Policy

How your Boss can put a Dollar Sign on your Cyber Security Policy

This is a guest blog post. Views expressed in this post are original thoughts posted by Chris van ‘t Hof of Tek Tok. These views are his own.

 

Perhaps you are one of the people who suspect hackers are knocking on the digital doors of your organization. You are probably right. But have you ever tried to convince your management team that your organization should spend more on cyber security measures? If you are a Chief Information Security Officer, you probably have to, even though it is the worst part of your job. If your organization has never been hacked, you have either done your job well, or just got lucky, but no one sees the need for improvements. Crying “cyber apocalypse is near” will only help for a while. Claiming they will just have to trust you on this one too. And in the event your organization finally is hacked, you are to blame it’s to late…

Read more...

Chris vant Hof
101 to Cyber Information Sharing

101 to Cyber Information Sharing

The emergence of the cyber threat phenomenon is forcing organizations to change how they think about security in many ways. One of these changes refers to organizations’ policy on sharing cyber related information with outside parties, while creating a collaborative effort to fight the cyber war. Such sharing, represents a shift in the legacy information technology paradigm of security silos, and creates a complex, multifaceted challenge to technology, law, organizational culture, privacy and even politics.

 

Sharing organizational cyber information is the communication of information regarding an organization’s security to an external party that results in gain for the sharing and receiving party alike. The challenges posed by innovative attack methods, such as the Advanced Persistent Threat (APT), reduce the effectiveness of traditional security mechanisms. To a certain extent, an inter-organizational cyber information sharing infrastructure can help the identification of an attack or attacker in a given organization, and once mitigated the details of the attack and/or the inoculation can be distributed to other organizations to help prevent similar attacks.

Read more...

Juniper Employee
  • cyber security
Securing the Information Systems’ Supply Chain

Securing the Information Systems’ Supply Chain

NCSAM2014.png

Serious concerns have emerged in the past several years about the integrity and trustworthiness of IT products and the ability of an adversary to compromise or insert vulnerabilities into IT products through infiltration of the supply chain. In particular, federal and critical IT customers have expressed concerns about adversaries intercepting products while in transit and reselling or hacking them. 

Read more...

Juniper Employee
Cyber Security Challenge UK Masterclass – Juniper was there and it was awesome!

Cyber Security Challenge UK Masterclass – Juniper was there and it was awesome!

If you have seen, listened or read any of the UK (or much of the international) press of the last few days you could not have failed to notice the coverage of the 2014 Cyber Security Challenge UK Masterclass. Juniper was there and this is what happened...

 

 

Read more...

Juniper Employee
Top Kudoed Authors
Latest Comments
networkingnow | 10-19-2017
Re: What is a Trusted Platform Module (TPM)?
networkingnow | 10-19-2017
Re: Automating Cyber Threat Intelligence with SkyATP: Part One
networkingnow | 10-16-2017
Re: What is a Trusted Platform Module (TPM)?