Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Latest Articles
How your Boss can put a Dollar Sign on your Cyber Security Policy

How your Boss can put a Dollar Sign on your Cyber Security Policy

This is a guest blog post. Views expressed in this post are original thoughts posted by Chris van ‘t Hof of Tek Tok. These views are his own.

 

Perhaps you are one of the people who suspect hackers are knocking on the digital doors of your organization. You are probably right. But have you ever tried to convince your management team that your organization should spend more on cyber security measures? If you are a Chief Information Security Officer, you probably have to, even though it is the worst part of your job. If your organization has never been hacked, you have either done your job well, or just got lucky, but no one sees the need for improvements. Crying “cyber apocalypse is near” will only help for a while. Claiming they will just have to trust you on this one too. And in the event your organization finally is hacked, you are to blame it’s to late…

Read more...

Chris vant Hof
From anecdotes to patterns: The emergence of a cyber defense cost and risk model

From anecdotes to patterns: The emergence of a cyber defense cost and risk model

When I first picked up the latest RAND research report, I did my 30 second scan of the table of contents and noticed a range of familiar topics: High cost of cyber security. Too much technology, not enough security. And, there's no silver bullet when it comes to security.

 

Nothing new here, or so I thought.

Read more...

Juniper Employee
  • RAND II
Why CISOs Should Care About the RAND Corporation’s New Cybersecurity Research

Why CISOs Should Care About the RAND Corporation’s New Cybersecurity Research

RAND ReportWhen it comes to cybersecurity, the industry has always struggled to understand the complexities that influence the true cost of security risks to businesses. As a chief information security officer (CISO), I’m faced with these multifaceted dilemmas daily and, just like others in the industry, struggle to determine the best security investments to protect a company’s valuable assets. Realistically, how can I predict what the landscape will look like five or 10 years down the road, or even, a week from now?

Read more...

Juniper Employee
  • RAND II
Top Kudoed Authors
Latest Comments
networkingnow | 10-19-2017
Re: What is a Trusted Platform Module (TPM)?
networkingnow | 10-19-2017
Re: Automating Cyber Threat Intelligence with SkyATP: Part One
networkingnow | 10-16-2017
Re: What is a Trusted Platform Module (TPM)?