Enhancing 5G DDoS Protection with Juniper Networks and Corero Network Security Joint Solution

2020 was a busy year for cybercriminals. As COVID-19 drove a dramatic acceleration of digital transformation, almost everything moved online. Today, cybercriminals have more potential attack targets than ever before.

Share
Newly Elected Juniper Networks’ Board Member for the Cyber Threat Alliance is the Organization’s First Woman in Role

When I was in the eighth grade, I wrote an essay on my hopes and dreams which centered on being elected the first woman President of the United States. At

Share
Quantum Key Distribution (QKD): How Does It Actually Work?

Quantum key distribution (QKD) is a technology that relies on quantum mechanics to share secret information between two distant locations. To many of us, quantum mechanics are incomprehensible – even

Share
What SASE Means for Service Providers

The COVID-19 pandemic and the rise of remote work have accelerated digital transformation and the shift to the cloud. It’s an industry turning point. Gartner predicts that by 2022, more

Share
Introducing Juniper® Security Director Cloud, Juniper’s Portal to SASE

SASE is everywhere. Recently, Secure Access Service Edge (SASE) has taken off, seemingly overnight. This term, coined by Gartner, describes the convergence of networking and security into an architecture that

Share
Sysrv Botnet Expands and Gains Persistence

On March 4, 2021, Juniper Threat Labs identified a surge of activity of the Sysrv botnet. The botnet spread itself into Windows and Linux systems by exploiting multiple vulnerabilities, which

Share
Quantums in Computing and Encryption: Are They the Same?

This blog post is a follow up to the introductory blog, “Solving the Quantum Computing Security Problem,” by Gert Grammel. Quantum computers capture the imagination of futurists, physicists, engineers and

Share
Third-Party Security Testing Is Invaluable – Here’s Why

When it comes to information security, most would agree that guessing is no substitute for knowing. While hope is not a strategy, many organizations employ this approach and don’t run

Share
Solving the Quantum Computing Security Problem

Encrypting files is and has always been an effective way to protect sensitive or confidential data. The earliest known use of encryption was found in hieroglyphs carved into the wall

Share
How to Size Firewalls in a Public Cloud

Enterprises are moving workloads to the public cloud to gain operational efficiencies and potential cost benefits. Throughout this transition, the network design must ensure that the end-user experience is not

Share