Juniper Networks Announces Intent to Acquire Mist Systems to Bring AI to IT
Juniper Networks announced that they've has entered into a definitive agreement to acquire Mist Systems, a pioneer in cloud-managed wireless networks powered by Artificial Intelligence (AI).

Ransomware 'LockerGoga' wreaks havoc on Norway's Norsk Hydro
What is 'LockerGoga' ransomware and how did it infect Norway's Norsk Hydro? Read all about it in this blog.

F5 Networks
F5 Acquires NGINX
F5 and NGINX announced a definitive agreement under which F5 will acquire all issued and outstanding shares of privately held NGINX for a total enterprise value of approximately $670 million.

Juniper Networks
Juniper announces end of life of popular EX Switches
Juniper Networks has announced the End of Life (EOL) of some of their most popular, but older, switches including: EX2200, EX3300, EX4220, EX4550.

5G
5G security: Challenges to overcome enabling new business models
As the world is about to start rolling out 5G networks, the question arises what the challenges will be to address 5G security and privacy concerns. In this blog René shares his thought on 5G security challenges and potential business benefits.

Half of top 12 global exploits targeted IoT devices
Fortinet announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that half of the top 12 global exploits targeted IoT devices, and four of the top 12 were related to IP-enabled cameras.

ETSI releases IoT security standard
The European Telecommunications Standardisation Institute (ETSI) has released their initial standard for securing IoT devices.

5G
Why network slicing will lead to 5G readiness
Blog on 5G Network Slicing and the three categories: 1) Enhanced Mobile Broadband (eMBB), 2) Ultra-reliable and Low-latency Communications (uRLLC), and 3) Massive Machine Type Communications (mMTC).

CrowdStrike
Crowdstrike publishes Global Cyber Threat Report 2019
Crowdstrike addresses the quickening pace and increasing sophistication in adversary tactics, techniques and procedures (TTPs) in Cyber Threat 2019 report

Palo Alto Networks
Palo Alto Networks Announces Intent to Acquire Demisto
Planned acquisition expands analytics and automation capabilities; enables company to continue accelerating its Application Framework strategy.

Juniper Networks expedites 5G Transformation for Service Providers
Juniper Networks continues to expand to address use cases across access, pre-aggregation and aggregation to assist in the transitions from 4G LTE to 5G. Includes ACX700 Universal Metro Routers, industry-first 400GbE native MACsec support and Triton Silicon-powered 14.4Tb line cards for the PTX10008

Palo Alto Networks
Palo Alto introduces 'fastest Next-Gen Firewall' with PA-7000 series
The Next Generation Firewall PA-7000 Series, enhanced with new network processing cards, offers threat prevention at speeds twice as fast as the nearest competitor,

Another coding example that turned into a malicious threat
Two days ago an example of bad code popped up in the security community when a programmer was reviewing 7Zip's code to see if it would suit his needs. 7Zip is a free open source software for compression and packing/unpacking of ZIP and GZIP formats.

SD-WAN Zero Touch Provisioning
Zero Touch Provisioning - What is it and is it useful for me?
Zero Touch Provisioning or ZTP is a term that appears increasingly on the feature list of networking products. ZTP can be found in switches, wireless access points, routers, NFV platforms and firewalls.

Telecoms 2018 report: Respondents mark security as biggest perceived threat to industry
This month Telecoms.com published their Annual Industry Survey report. With over 1000+ responses from telecoms professionals, the report is a good reality check on the Telecom industry and provides a sober (and optimistic) look into the coming era of the industry.

SD-WAN
The time for SD-WAN standardisation has arrived
Facing the challenge of interconnection and integration of multiple SD-WAN solutions. This blog of SD-WAN expert Jan-Willem Keinke dives into standardization frameworks (MEF) and more.

Top to Bottom Success in the Enterprise WAN
Multicloud has changed the world, and as much as the transition is impacting the inside of the modern data center, it is reshaping the networks between them.

Global media company transforms network security with visibility and Network Access Control (NAC)
Infradata supports a leading media company to strengthen the security of the network through Network Access Control (NAC). With this security solution, the security policy for access to the entire network as well as endpoint security is greatly improved.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.

