Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Latest Articles
Creating a Culture of Cybersecurity

Creating a Culture of Cybersecurity

For organizations implementing or enhancing cyber-security policies, the type of culture and technology changes required to prevent attacks can be a sensitive issue. The ideal scenario is one of partnership – where employees understand the rationale for policy and act as additional eyes and ears for the company – creating a unified defense against would-be attackers. Here are some key considerations when it comes to creating a culture of cybersecurity.

Read more...

Juniper Employee
Simple Steps to Increase Your Online Safety

Simple Steps to Increase Your Online Safety

The internet has revolutionized the way we live our lives and has provided greater convenience and access to information, entertainment and services. But it seems that every week we hear about a new virus, cyber attack, or data-breach. Cyber-criminals are increasing the frequency and sophistication of their attacks on governments, businesses and individuals. They are after our personal information in order to use it against us or for profit.

 

As the author Bodie Thoene said, “What is right is often forgotten by what is convenient” and this is unfortunately often the case while going online. The National Cyber Security Alliance’s website - Stay Safe Online – is a thorough resource with guidance from online safety basics to resources to how to cyber secure yourself and your business and even delves further into how to report cybercrime. Ultimately, our online responsibility is up to us and here are a few tips to stay safe online:

Read more...

Juniper Employee
Juniper Networks Extends Policy Enforcement for 3rd-Party Switches

Juniper Networks Extends Policy Enforcement for 3rd-Party Switches

Lately, it seems that every time we turn around, there’s a cyber-assault, potentially more dangerous and more devious than the last. There’s the real threats and attacks like WannaCry. And there’s the apparently fabricated news you see on television and in theaters. We appear to be surrounded by virtually any sort of potential cybercrime. But we shouldn’t have to accept this as normal.

 

On top of this very active threat climate, organizations are drowning in the complexity of dozens of “best-of-breed” security solutions that get pulled together in an effort to build a proper defense solution. On top of this, organizations face a flood of alerts on many different consoles, and need to try and keep numerous security policies up-to-date. Did you know that most policies are written once and rarely updated? These go mostly unnoticed until there’s a security incident and the root cause analysis points to an ancient policy that was left unattended.

Read more...

Juniper Employee
Putting a Dent in Cybercrime: From Industry to Individual

Putting a Dent in Cybercrime: From Industry to Individual

The idea of a lone hacker maliciously tapping away in a dark room is an antiquated one. The business of cybercrime is now a multibillion-dollar enterprise with highly organized entities looking to exploit vulnerabilities and scam businesses and consumers in our increasingly networked world. According to a Juniper commissioned report from the RAND Corporation:

 

The cyber black market has evolved from a varied landscape of discrete, ad hoc individuals into a network of highly organized groups, often connected with traditional crime groups (e.g., drug cartels, mafias, terrorist cells) and nation-states. It does not differ much from a traditional market or other typical criminal enterprises; participants communicate through various channels, place their orders, and get products.

 

Today, attackers are much more efficient in their efforts than ever before, driven by the ability to work with others in the criminal underground. Left unchecked, I worry that the ability to defend against these organizations will be more challenging.

Read more...

Juniper Employee
Top Kudoed Authors
Latest Comments
networkingnow | 10-16-2017
Re: What is a Trusted Platform Module (TPM)?
networkingnow | 10-13-2017
Re: Creating a Culture of Cybersecurity
networkingnow | 08-22-2017
Re: “Alexa, ask SkyATP…”