Mounir Hahad is head of Juniper Threat Labs, the organization at Juniper Networks identifying and tracking malicious threats in the wild and ensuring Juniper products implement effective detection techniques. David
![Seize the Opportunity: Crucial Skills for a Career in Cybersecurity](https://blogs.juniper.net/wp-content/uploads/2020/05/Security_v2color.png)
It’s no secret that the cybersecurity industry is facing a shortage of skilled professionals. The threat landscape has evolved faster than nearly anyone was expecting, creating a high demand for
![Secondhand IoT Devices, Firsthand Threats to Security](https://blogs.juniper.net/wp-content/uploads/2020/05/Security_v1-color.png)
From thermostats and voice assistants to fitness trackers and toys, smart and internet-connected gadgets are now found in nearly every room of most homes. It’s tempting to try and save
![Black Hat 2018: Securing the Expanding Cyberattack Landscape](https://blogs.juniper.net/wp-content/uploads/2020/05/Image-1_BlackHatLogo.png)
There is a recurring theme at Black Hat every year: security researchers come together and show the world how to hack into systems and things. This year was no exception.
![Dutch Water Counsel Stays Afloat with Juniper Networks](https://blogs.juniper.net/wp-content/uploads/2020/05/Image-1_watercounsels.png)
There are 21 water counsels in the Netherlands that collectively have the job of protecting the 25 percent of the country (four million people) that are somewhere between 10 meters
![Be Ready for Cloud, 5G and IoT with Advanced Security Acceleration](https://blogs.juniper.net/wp-content/uploads/2020/01/SECURITY-90112990.jpg)
Now more than ever, our networks and infrastructure require security that keeps pace not only with cybercrime, but with the demands of ubiquitous streaming, a myriad of devices and accelerated
![Harnessing Cybersecurity Automation](https://blogs.juniper.net/wp-content/uploads/2020/05/Security_v4color.png)
Security automation can be the key for organizations to improve their security posture and make the most of scarce security personnel. However, more than 70 percent say that they struggle
![Windows Exploitation and AntiExploitation Evolution](https://blogs.juniper.net/wp-content/uploads/2020/05/Security_v3color.png)
Windows has been a target of hackers for a long time. The reason is simple: it is the OS with the largest deployment footprint around the world. Hackers discover vulnerabilities
![GDPR Considerations for Companies Outside the European Union](https://blogs.juniper.net/wp-content/uploads/2020/01/SECURITY-90112990.jpg)
On May 25th, 2018, the General Data Protection Regulation (GDPR) becomes enforceable under law in the European Union (EU). It fundamentally changes how businesses (and the public sector) must handle
![Stopping 1.4Tbps memecached DDoS attack at Peering router](https://blogs.juniper.net/wp-content/uploads/2020/05/Security_v2color.png)
About the attack In the late February 2018 enormously high-volume DDoS attack was observed. It was UDP based memcached service reflection-and-amplification attack, reported as 1.4Tbpos strength. The 1.4Tbps it is