Juniper SRX Series: 1 Million Sold and Counting!

To our customers: thanks a million.     This week at Juniper, we are celebrating an epic milestone: the shipment of our one millionth SRX Series platform! That’s one million

Share
Safeguarding the Nation’s Critical Infrastructure: Q&A with Mounir Hahad and David Mihelcic

Mounir Hahad is head of Juniper Threat Labs, the organization at Juniper Networks identifying and tracking malicious threats in the wild and ensuring Juniper products implement effective detection techniques. David

Share
Seize the Opportunity: Crucial Skills for a Career in Cybersecurity

It’s no secret that the cybersecurity industry is facing a shortage of skilled professionals. The threat landscape has evolved faster than nearly anyone was expecting, creating a high demand for

Share
Secondhand IoT Devices, Firsthand Threats to Security

From thermostats and voice assistants to fitness trackers and toys, smart and internet-connected gadgets are now found in nearly every room of most homes. It’s tempting to try and save

Share
Black Hat 2018: Securing the Expanding Cyberattack Landscape

There is a recurring theme at Black Hat every year: security researchers come together and show the world how to hack into systems and things. This year was no exception.

Share
Dutch Water Counsel Stays Afloat with Juniper Networks

There are 21 water counsels in the Netherlands that collectively have the job of protecting the 25 percent of the country (four million people) that are somewhere between 10 meters

Share
Be Ready for Cloud, 5G and IoT with Advanced Security Acceleration

Now more than ever, our networks and infrastructure require security that keeps pace not only with cybercrime, but with the demands of ubiquitous streaming, a myriad of devices and accelerated

Share
Harnessing Cybersecurity Automation

Security automation can be the key for organizations to improve their security posture and make the most of scarce security personnel. However, more than 70 percent say that they struggle

Share
Windows Exploitation and AntiExploitation Evolution

Windows has been a target of hackers for a long time. The reason is simple: it is the OS with the largest deployment footprint around the world. Hackers discover vulnerabilities

Share
GDPR Considerations for Companies Outside the European Union

On May 25th, 2018, the General Data Protection Regulation (GDPR) becomes enforceable under law in the European Union (EU). It fundamentally changes how businesses (and the public sector) must handle

Share