Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Latest Articles
Automating Cyber Threat Intelligence with SkyATP: Part One

Automating Cyber Threat Intelligence with SkyATP: Part One

Each year, the economics of "fighting back" against Hacktivism, CyberCrime, and the occasional State-Sponsored attack become more and more untenable for the typical Enterprise. It's nearly impossible for the average Security Team to stay up to date with the latest emerging threats while also being tasked with their regular duties. Given the current economic climate, the luxury of having a dedicated team to perform Cyber Threat Intelligence (CTI) is generally out of reach for all but the largest of Enterprises. While automated identification, curation, and enforcement of CTI cannot truly replace human Security Analysts (yet), it has been shown to go a long way towards increasing the effectiveness and agility of your Security infrastructure. 

Read more...

Juniper Employee
Security Intelligence Imperative for Government Information Systems

Security Intelligence Imperative for Government Information Systems

Cowritten by Mark Belk, National Government Chief Architect and Rebecca Lawson, Senior Director Security

   

SecIntel_Imprative_GIS

 

The pace of change seen in the adoption of new methods and technology deployed by nefarious characters in cyberspace continues to place new demands on government information systems. There are multiple persistent cybersecurity threats targeting governments, critical infrastructure, economic institutions and commercial property. The government has recognized these threats. In fact, the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) program increases network defense through the modernization of information system infrastructure.

Read more...

Juniper Employee
Marrying the Firewall with the Threat Intelligence You Need

Marrying the Firewall with the Threat Intelligence You Need

threatintelligence.pngTo avoid becoming the next victim in the long line of data breach impacted organizations, many have started using a diverse and wide array of threat intelligence sources such as honeypots, social media monitoring, malware reverse engineering approaches, or others, as described by Anton Chuvakin in this blog.

Read more...

skathuria
Top Kudoed Authors
Latest Comments
networkingnow | 10-16-2017
Re: What is a Trusted Platform Module (TPM)?
networkingnow | 10-13-2017
Re: Creating a Culture of Cybersecurity
networkingnow | 08-22-2017
Re: “Alexa, ask SkyATP…”