The COVID-19 pandemic and the rise of remote work have accelerated digital transformation and the shift to the cloud. It’s an industry turning point. Gartner predicts that by 2022, more
![Introducing Juniper® Security Director Cloud, Juniper’s Portal to SASE](https://blogs.juniper.net/wp-content/uploads/2021/05/SASE-MF_Blog_FeatImage.png)
SASE is everywhere. Recently, Secure Access Service Edge (SASE) has taken off, seemingly overnight. This term, coined by Gartner, describes the convergence of networking and security into an architecture that
![Sysrv Botnet Expands and Gains Persistence](https://blogs.juniper.net/wp-content/uploads/2021/04/sysrv2.jpg)
On March 4, 2021, Juniper Threat Labs identified a surge of activity of the Sysrv botnet. The botnet spread itself into Windows and Linux systems by exploiting multiple vulnerabilities, which
![Quantums in Computing and Encryption: Are They the Same?](https://blogs.juniper.net/wp-content/uploads/2021/03/blog-image-world-computing-connectivit6y.png)
This blog post is a follow up to the introductory blog, “Solving the Quantum Computing Security Problem,” by Gert Grammel. Quantum computers capture the imagination of futurists, physicists, engineers and
![Third-Party Security Testing Is Invaluable – Here’s Why](https://blogs.juniper.net/wp-content/uploads/2021/02/TW-Women-cybersecurity-1-300x169.png)
When it comes to information security, most would agree that guessing is no substitute for knowing. While hope is not a strategy, many organizations employ this approach and don’t run
![Solving the Quantum Computing Security Problem](https://blogs.juniper.net/wp-content/uploads/2020/05/Security_v4color.png)
Encrypting files is and has always been an effective way to protect sensitive or confidential data. The earliest known use of encryption was found in hieroglyphs carved into the wall
![How to Size Firewalls in a Public Cloud](https://blogs.juniper.net/wp-content/uploads/2021/01/vSRX-VPC-Blog-Image.png)
Enterprises are moving workloads to the public cloud to gain operational efficiencies and potential cost benefits. Throughout this transition, the network design must ensure that the end-user experience is not
![Architectural Choice: The Key to a Successful SASE Journey](https://blogs.juniper.net/wp-content/uploads/2021/01/FB-SASE-Architecture.png)
In the final installment of our three-part series on the journey to Secure Access Service Edge (SASE), we’ll discuss the architecture. See part two in our SASE series here. An
![Next Stop on the SASE Journey: Establishing a Plan and Team for Success](https://blogs.juniper.net/wp-content/uploads/2020/12/SASE-Journey-Part-Two.png)
In this second installment of our three-part series on the journey to Secure Access Service Edge (SASE), the focus will be identifying team members and developing a plan that will
![DarkIRC bot exploits recent Oracle WebLogic vulnerability](https://blogs.juniper.net/wp-content/uploads/2020/11/SEC-200749_DIGITAL_Threat-Labs-blog-image-Oracle.gif)
Juniper Threat Labs is seeing active attacks on Oracle WebLogic software using CVE-2020-14882. This vulnerability, if successfully exploited, allows unauthenticated remote code execution. As of this writing, we found