Security Monoculture Leads to Failure – Diversify and Scale with Juniper Connected Security

Information security is inextricable from all aspects of IT and it must include everything from cloud-based advanced threat prevention to physical switches that automatically quarantine infected devices.  Automating IT in

Share
World Password Day: We Need to Talk

Passwords are the foundation upon which much of modern IT security is built, and what better day to discuss the topic than World Password Day, an event which occurs on the

Share
Security Monoculture leads to failure – Diversify and Scale with Juniper Connected Security

Information security is inextricable from all aspects of IT and it must include everything from cloud-based advanced threat prevention to physical switches that automatically quarantine infected devices.  Automating IT in

Share
Juniper Networks and IoT Institute Survey: As IoT Deployments Collide with Multicloud Ecosystems, Where Does Security Stand?

According to Gartner, “by 2020, 75% of organizations will have deployed a multicloud or hybrid cloud model for their IT needs.”1 While we’ve known for some time that the future

Share
ATP Appliances Deliver One-Touch Solution for Building a Stronger Security Posture

As 2018 comes to a close, it’s clear we need continued security innovations to keep our organizations better protected from cybercrime. Bad actors with limitless resources are hyper-innovative in finding

Share
Juniper SRX Series: 1 Million Sold and Counting!

To our customers: thanks a million.     This week at Juniper, we are celebrating an epic milestone: the shipment of our one millionth SRX Series platform! That’s one million

Share
Safeguarding the Nation’s Critical Infrastructure: Q&A with Mounir Hahad and David Mihelcic

Mounir Hahad is head of Juniper Threat Labs, the organization at Juniper Networks identifying and tracking malicious threats in the wild and ensuring Juniper products implement effective detection techniques. David

Share
Seize the Opportunity: Crucial Skills for a Career in Cybersecurity

It’s no secret that the cybersecurity industry is facing a shortage of skilled professionals. The threat landscape has evolved faster than nearly anyone was expecting, creating a high demand for

Share
Secondhand IoT Devices, Firsthand Threats to Security

From thermostats and voice assistants to fitness trackers and toys, smart and internet-connected gadgets are now found in nearly every room of most homes. It’s tempting to try and save

Share
Black Hat 2018: Securing the Expanding Cyberattack Landscape

There is a recurring theme at Black Hat every year: security researchers come together and show the world how to hack into systems and things. This year was no exception.

Share