Introducing Juniper® Security Director Cloud, Juniper’s Portal to SASE

SASE is everywhere. Recently, Secure Access Service Edge (SASE) has taken off, seemingly overnight. This term, coined by Gartner, describes the convergence of networking and security into an architecture that

Share
Sysrv Botnet Expands and Gains Persistence

On March 4, 2021, Juniper Threat Labs identified a surge of activity of the Sysrv botnet. The botnet spread itself into Windows and Linux systems by exploiting multiple vulnerabilities, which

Share
Quantums in Computing and Encryption: Are They the Same?

This blog post is a follow up to the introductory blog, “Solving the Quantum Computing Security Problem,” by Gert Grammel. Quantum computers capture the imagination of futurists, physicists, engineers and

Share
Third-Party Security Testing Is Invaluable – Here’s Why

When it comes to information security, most would agree that guessing is no substitute for knowing. While hope is not a strategy, many organizations employ this approach and don’t run

Share
Solving the Quantum Computing Security Problem

Encrypting files is and has always been an effective way to protect sensitive or confidential data. The earliest known use of encryption was found in hieroglyphs carved into the wall

Share
How to Size Firewalls in a Public Cloud

Enterprises are moving workloads to the public cloud to gain operational efficiencies and potential cost benefits. Throughout this transition, the network design must ensure that the end-user experience is not

Share
Architectural Choice: The Key to a Successful SASE Journey

In the final installment of our three-part series on the journey to Secure Access Service Edge (SASE), we’ll discuss the architecture. See part two in our SASE series here. An

Share
Next Stop on the SASE Journey: Establishing a Plan and Team for Success

In this second installment of our three-part series on the journey to Secure Access Service Edge (SASE), the focus will be identifying team members and developing a plan that will

Share
DarkIRC bot exploits recent Oracle WebLogic vulnerability

  Juniper Threat Labs is seeing active attacks on Oracle WebLogic software using CVE-2020-14882. This vulnerability, if successfully exploited, allows unauthenticated remote code execution. As of this writing, we found

Share
AI-Driven Security Brings Better Visibility and Control to Your Network Edge

With the rise in remote work, employee devices often share networks with personal and new devices are regularly added to networks – and often, unbeknownst to IT. Incomplete network visibility

Share