Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Latest Articles
Secure Data in a Device Driven World

Secure Data in a Device Driven World

IoT security has become one of those harrowing buzzwords over the past few years, as connected devices have gone from a seemingly innocent addition to increase convenience in your life to a potential avenue for attackers to steal or control your data. IoT shouldn’t be scary, what it should do is propel us to take a fundamentally different approach to cybersecurity to ensure this new form of data collection isn’t exposing us to risk or causing us harm.

 

Recent research has shown that there are 8.4 billion IoT devices in use today – that number is expected to surpass more than 20 billion by 2020. This sheer magnitude and scale of new devices is one of the key issues leading to an increase in risks across our ecosystems. If we adopt a few best practices we can help ensure that the data collected by these devices remains safe. Here are three ways to make that happen.

Read more...

Juniper Employee
Creating a Culture of Cybersecurity

Creating a Culture of Cybersecurity

For organizations implementing or enhancing cyber-security policies, the type of culture and technology changes required to prevent attacks can be a sensitive issue. The ideal scenario is one of partnership – where employees understand the rationale for policy and act as additional eyes and ears for the company – creating a unified defense against would-be attackers. Here are some key considerations when it comes to creating a culture of cybersecurity.

Read more...

Juniper Employee
Simple Steps to Increase Your Online Safety

Simple Steps to Increase Your Online Safety

The internet has revolutionized the way we live our lives and has provided greater convenience and access to information, entertainment and services. But it seems that every week we hear about a new virus, cyber attack, or data-breach. Cyber-criminals are increasing the frequency and sophistication of their attacks on governments, businesses and individuals. They are after our personal information in order to use it against us or for profit.

 

As the author Bodie Thoene said, “What is right is often forgotten by what is convenient” and this is unfortunately often the case while going online. The National Cyber Security Alliance’s website - Stay Safe Online – is a thorough resource with guidance from online safety basics to resources to how to cyber secure yourself and your business and even delves further into how to report cybercrime. Ultimately, our online responsibility is up to us and here are a few tips to stay safe online:

Read more...

Juniper Employee
Revitalizing Critical Infrastructures for Modern Resiliency

Revitalizing Critical Infrastructures for Modern Resiliency

According to a 2014 report from the ICS-CERT, industrial control systems in the United States were threatened by cyber-attacks at least 245 times over a 12-month period by nation-state hackers, cybercriminals, cyber terrorists and hacktivists. The potential risk to critical infrastructure is real and it’s important that the public and private sector work collectively to protect these critical systems.

Read more...

Juniper Employee
  • NCSAM
Top Kudoed Authors
Latest Comments
networkingnow | 10-19-2017
Re: What is a Trusted Platform Module (TPM)?
networkingnow | 10-19-2017
Re: Automating Cyber Threat Intelligence with SkyATP: Part One
networkingnow | 10-16-2017
Re: What is a Trusted Platform Module (TPM)?