Juniper Networks is a Champion! Juniper’s Connected Security strategy combines deep network visibility with the ability to enforce security at every connection point throughout the network and this continues to

Share
Scaling WFH Efforts with Juniper Connected Security

It’s no secret that 2020 is experiencing explosive growth in employees working from home. Organizations around the world must now extend the security controls typically used to protect a handful

Share
It Takes More Than Marketing to Implement a SASE Solution

There has always been a strong need to support distributed workforces in an agile and cost-effective way. However, this has never been more important than today. Not only has there

Share
COVID-19 and FMLA Campaigns used to install new IcedID banking malware

  Juniper Threat Labs has been monitoring a campaign that pushes a new IcedID banking trojan. This new campaign changes tactics by injecting into msiexec.exe to conceal itself and use

Share
Don’t Wait Until It’s Too Late: Save the Network from Crippling DDoS Attacks

Network connectivity is no longer a desire; it has become a necessity to be productive. Whether working, studying or researching, the network is relied on to get the job done,

Share
Keeping Personal Information Safe on World Password Day and Year-Round

Today is World Password Day and this means that, once again, vendors, bloggers and pundits from around the world will put forth a large volume of conflicting advice. So, just

Share

Organizations around the globe have experienced a sudden and significant increase in staff working from home – and this growth is causing overload in traditionally-configured VPNs. Routing all endpoint traffic

Share
Keeping Your Business Secure with a Remote Workforce

Rapid change requires rapid adaptation and today, IT teams find themselves in the middle of one such event calling for this. Dealing with change is part and parcel of life

Share
IoT botnet exploiting TVT Shenzhen DVRs still lingers

Juniper Threat Labs has been monitoring an IoT botnet that has been active in the wild since October 2, 2019. It exploits a vulnerability in Shenzhen TVT DVR NVMS-9000. The

Share
Key Takeaways from RSAC 2020

As the first major information security event of the year, RSAC sets the tone for the industry and the announcements that will follow for at least the next six months. The

Share