{"id":10198,"date":"2015-09-05T05:00:17","date_gmt":"2015-09-05T12:00:17","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=10198"},"modified":"2015-12-08T17:13:55","modified_gmt":"2015-12-09T01:13:55","slug":"palo-alto-networks-news-of-the-week-september-5","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/09\/palo-alto-networks-news-of-the-week-september-5\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 September 5"},"content":{"rendered":"<p>We\u2019ve rounded up all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/news-of-the-week\" target=\"_blank\">Palo Alto Networks news<\/a> from this past week.<\/p>\n<p>Unit 42 <a href=\"http:\/\/bit.ly\/1Iwa9qJ\" rel=\"nofollow,noopener\"  target=\"_blank\">shared its findings on KeyRaider<\/a>, an iOS malware that has stolen over 225,000 Apple accounts and led to what is believed to be the largest known Apple account theft caused by malware. The threat intelligence team also followed up on its initial findings to <a href=\"http:\/\/bit.ly\/1N7WtKo\" rel=\"nofollow,noopener\"  target=\"_blank\">offer guidance<\/a> on how best to keep yourself safe from KeyRaider.<\/p>\n<p>Palo Alto Networks has been nominated for three 2015 Computing Security Awards! <a href=\"http:\/\/bit.ly\/1O0LQZ3\" rel=\"nofollow,noopener\"  target=\"_blank\">Vote now<\/a>.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1O0LQZ3\" rel=\"nofollow,noopener\" ><div style=\"max-width:100%\" data-width=\"425\"><span class=\"ar-custom\" style=\"padding-bottom:46.35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-10191 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/computing-security-awards.png\" alt=\"computing security awards\" width=\"425\" height=\"197\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/computing-security-awards.png 425w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/computing-security-awards-230x107.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/computing-security-awards-86x40.png 86w\" sizes=\"auto, (max-width: 425px) 100vw, 425px\" \/><\/span><\/div><\/a><\/p>\n<p><!--more--><\/p>\n<p>Matt Mellen <a href=\"http:\/\/bit.ly\/1UkOIVQ\" rel=\"nofollow,noopener\"  target=\"_blank\">discussed<\/a> findings from a survey of healthcare executives conducted by KPMG, and some best practices to consider for effective protection of today\u2019s hospital networks.<\/p>\n<p>Karin Shopen <a href=\"http:\/\/bit.ly\/1VzJq5P\" rel=\"nofollow,noopener\"  target=\"_blank\">detailed<\/a> five things your cybersecurity team must do.<\/p>\n<p>Davis Hake <a href=\"http:\/\/bit.ly\/1L83EfF\" rel=\"nofollow,noopener\"  target=\"_blank\">talked<\/a> about why the cybersecurity industry needs to learn to play together.<\/p>\n<p>We prepared the definitive <a href=\"http:\/\/bit.ly\/1KExcWd\" rel=\"nofollow,noopener\"  target=\"_blank\">Cybersecurity Buyer\u2019s Guide<\/a>, complete with recommended criteria for choosing a cybersecurity solution that can block cyberattacks and protect allowed traffic from known and unknown threats.<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyMQ==\">Palo Alto Networks Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: September 8, 2015 7:00 AM - 11:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg0Nw==\">\u8a8d\u5b9a\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0 (9\/8\uff5e10)<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 8, 2015 10:00 AM - 6:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyOQ==\">Mobile Threat Workshop \u2013 Denver<\/a><\/p>\n<ul>\n<li>When: September 9, 2015 11:30 AM - 1:30 PM MST<\/li>\n<li>Where: Denver, CO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzkxMg==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: September 9, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzc5Mw==\">LIVE EVENT: The Ultimate Test Drive \u2013 NSX and Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: September 10, 2015 12:00 PM - 4:00 PM EST<\/li>\n<li>Where: Reston, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDA3OA==\">Palo Alto Networks Zero Trust Security for Endpoints<\/a> [Turkish]<\/p>\n<ul>\n<li>When: September 10, 2015 10:00 AM - 11:00 AM EET<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY5Mg==\">9\u670811\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 11, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk4NA==\">Die Zwei um Zw\u00f6lf: Quality of Service (QoS)<\/a> [German]<\/p>\n<ul>\n<li>When: September 11, 2015 12:00 PM - 1:00 PM CET<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk4OA==\">Die Zwei um Zw\u00f6lf: Quality of Service (QoS)<\/a> [German]<\/p>\n<ul>\n<li>When: September 11, 2015 12:00 PM - 1:00 PM CET<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg3Ng==\">Introduction to Palo Alto Networks Next Generation Firewalls<\/a><\/p>\n<ul>\n<li>When: September 14, 2015 10:00 AM - 6:00 PM EST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk0MQ==\">Technical Partner Bootcamp - Columbus, OH<\/a><\/p>\n<ul>\n<li>When: September 14, 2015 9:00 AM - 5:00 PM EST<\/li>\n<li>Where: Hilliard, OH<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgzMA==\">Mobile Threat Workshop \u2013 Minneapolis<\/a><\/p>\n<ul>\n<li>When: September 15, 2015 11:30 AM - 1:30 PM CST<\/li>\n<li>Where: Minneapolis, MN<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDA4Ng==\">Partner Marketing Update<\/a><\/p>\n<ul>\n<li>When: September 15, 2015 11:00 AM - 12:00 PM EET<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY5OA==\">9\u670816\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 16, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzkxMQ==\">Demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva tarkoittaa k\u00e4yt\u00e4nn\u00f6ss\u00e4<\/a> [Finnish]<\/p>\n<ul>\n<li>When: September 16, 2015 1:00 PM - 2:00 PM EET<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg5Mw==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: September 16, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY4Mw==\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: September 16, 2015 9:30 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk0Mw==\">Crack the Code<\/a><\/p>\n<ul>\n<li>When: September 17, 2015 11:30 AM - 1:30 PM EST<\/li>\n<li>Where: McLean, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyNA==\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: September 17, 2015 11:30 AM - 3:30 PM CST<\/li>\n<li>Where: Spring, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk0Mg==\">Technical Partner Bootcamp - Columbus, OH<\/a><\/p>\n<ul>\n<li>When: September 17, 2015 9:00 AM - 5:00 PM EST<\/li>\n<li>Where: Hilliard, OH<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk5OA==\">Ultimate Test Drive workshop Perth<\/a><\/p>\n<ul>\n<li>When: September 17, 2015 9:00 AM - 12:30 PM GMT+8:00<\/li>\n<li>Where: Perth, WA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDA3OQ==\">\u0414\u043e\u0432\u0435\u0440\u044f\u0439, \u043d\u043e \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0439 \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435<\/a> [Russian]<\/p>\n<ul>\n<li>When: September 17, 2015 12:00 PM - 1:00 PM EET<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg0NA==\">\u8a8d\u5b9a\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0 (9\/17\uff5e18)<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 17, 2015 10:00 AM - 6:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzcwMA==\">9\u670818\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70(\u5927\u962a)<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 18, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5927\u962a\u5e02\u5317\u533a<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve rounded up all of the top Palo Alto Networks news from this past week. Unit 42 shared its findings on KeyRaider, an iOS malware that has stolen over 225,000 Apple accounts &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[621,1418,1408],"coauthors":[709],"class_list":["post-10198","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-computing-security-awards","tag-definitive-cybersecurity-buyers-guide","tag-keyraider"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=10198"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10198\/revisions"}],"predecessor-version":[{"id":11348,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10198\/revisions\/11348"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=10198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=10198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=10198"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=10198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}