{"id":10275,"date":"2015-09-12T06:00:09","date_gmt":"2015-09-12T13:00:09","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=10275"},"modified":"2021-03-22T08:44:28","modified_gmt":"2021-03-22T15:44:28","slug":"palo-alto-networks-news-of-the-week-september-12","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/09\/palo-alto-networks-news-of-the-week-september-12\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 September 12"},"content":{"rendered":"<p>Here is all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/news-of-the-week\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a> from this past week.<\/p>\n<p>Unit 42\u00a0<a href=\"http:\/\/bit.ly\/1UztOSL\" target=\"_blank\" rel=\"noopener\">analyzed<\/a> Musical Chairs, a multi-year campaign, and unveiled a newly deployed variant of Gh0st malware, \u201cPiano Gh0st.\"<\/p>\n<p>Palo Alto Networks researchers\u00a0<a href=\"http:\/\/bit.ly\/1OvZLUV\" target=\"_blank\" rel=\"noopener\">discovered<\/a> critical vulnerabilities in Internet Explorer and Adobe Shockwave Player.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7596 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png\" alt=\"blog-title-unit42\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-510x69.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-240x32.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png 632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks CEO Mark McLaughlin <a href=\"http:\/\/bit.ly\/1JYkbTy\" target=\"_blank\" rel=\"noopener\">talked<\/a> prevention, automation and cyber threat intelligence on CNBC.<!--more--><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/2.png\"><div style=\"max-width:100%\" data-width=\"496\"><span class=\"ar-custom\" style=\"padding-bottom:54.64%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10277 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/2.png\" alt=\"2\" width=\"496\" height=\"271\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/2.png 496w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/2-230x126.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/2-73x40.png 73w\" sizes=\"auto, (max-width: 496px) 100vw, 496px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/09\/breaking-ground-on-a-new-home-for-palo-alto-networks\/\" target=\"_blank\" rel=\"noopener\">broke ground<\/a> this week on the site for its new headquarters in Santa Clara.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/Ground-breaking_zoom_med_sm.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:51.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10278 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/Ground-breaking_zoom_med_sm-500x259.jpg\" alt=\"Ground-breaking_zoom_med_sm\" width=\"500\" height=\"259\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/Ground-breaking_zoom_med_sm-500x259.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/Ground-breaking_zoom_med_sm-230x119.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/Ground-breaking_zoom_med_sm-510x264.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/Ground-breaking_zoom_med_sm-77x40.jpg 77w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/Ground-breaking_zoom_med_sm.jpg 1024w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks was <a href=\"http:\/\/bit.ly\/1OetLET\" target=\"_blank\" rel=\"noopener\">recognized<\/a> by TSIA for outstanding commitment to customer support and success.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/TSIA-certif.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:25.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10202 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/TSIA-certif-500x127.jpg\" alt=\"TSIA certif\" width=\"500\" height=\"127\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/TSIA-certif-500x127.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/TSIA-certif-230x58.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/TSIA-certif-510x129.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/TSIA-certif-158x40.jpg 158w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/TSIA-certif.jpg 1070w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks <a href=\"http:\/\/bit.ly\/1hZ209o\" target=\"_blank\" rel=\"noopener\">joined<\/a> the Information Technology Industry Council (ITI).<\/p>\n<p>Find out why Ben Rothke <a href=\"http:\/\/bit.ly\/1K86ikO\" target=\"_blank\" rel=\"noopener\">nominated<\/a> \"Measuring and Managing Information Risk: A FAIR Approach\" for the Cybersecurity Canon.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9648 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png\" alt=\"cybersec canon red\" width=\"500\" height=\"218\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-230x100.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-510x223.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-91x40.png 91w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png 786w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks has been nominated for three 2015 Computing Security Awards! <a href=\"http:\/\/bit.ly\/1O0LQZ3\" target=\"_blank\" rel=\"noopener\">Vote now<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/computing-security-awards.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:46.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-10191 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/computing-security-awards.png\" alt=\"computing security awards\" width=\"500\" height=\"232\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/computing-security-awards.png 425w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/computing-security-awards-230x107.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/09\/computing-security-awards-86x40.png 86w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Ron Myers, VP Global Channels at Palo Alto Networks, <a href=\"http:\/\/bit.ly\/1KHnLa9\" target=\"_blank\" rel=\"noopener\">called<\/a> the VMware and Palo Alto Networks partnership a tremendous growth opportunity for our valued partners.<\/p>\n<p>Fuel User Group's Spark User Summit Amsterdam agenda is live! <a href=\"http:\/\/bit.ly\/1Vwuc1p\" target=\"_blank\" rel=\"noopener\">Check it out<\/a> &amp; register today.<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk0MQ==\">Technical Partner Bootcamp - Columbus, OH<\/a><\/p>\n<ul>\n<li>When: September 14, 2015 9:00 AM - 5:00 PM EST<\/li>\n<li>Where: Hilliard, OH<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDEzNg==\">Uncovering a New Source of Underground Cyberthreats<\/a><\/p>\n<ul>\n<li>When: September 15, 2015 12:00 PM - 2:00 PM EST<\/li>\n<li>Where: Providence, RI<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY5OA==\">9\u670816\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 16, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzkxMQ==\">Demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva tarkoittaa k\u00e4yt\u00e4nn\u00f6ss\u00e4<\/a> [Finnish]<\/p>\n<ul>\n<li>When: September 16, 2015 1:00 PM - 2:00 PM EET<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg5Mw==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: September 16, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY4Mw==\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: September 16, 2015 9:30 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk0Mw==\">Crack the Code<\/a><\/p>\n<ul>\n<li>When: September 17, 2015 11:30 AM - 1:30 PM EST<\/li>\n<li>Where: McLean, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyNA==\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: September 17, 2015 11:30 AM - 3:30 PM CST<\/li>\n<li>Where: Spring, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk0Mg==\">Technical Partner Bootcamp - Columbus, OH<\/a><\/p>\n<ul>\n<li>When: September 17, 2015 9:00 AM - 5:00 PM EST<\/li>\n<li>Where: Hilliard, OH<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk5OA==\">Ultimate Test Drive workshop Perth<\/a><\/p>\n<ul>\n<li>When: September 17, 2015 9:00 AM - 12:30 PM GMT+8:00<\/li>\n<li>Where: Perth, WA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDA3OQ==\">\u0414\u043e\u0432\u0435\u0440\u044f\u0439, \u043d\u043e \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0439 \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435<\/a> [Russian]<\/p>\n<ul>\n<li>When: September 17, 2015 12:00 PM - 1:00 PM EET<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg0NA==\">\u8a8d\u5b9a\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0 (9\/17\uff5e18)<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 17, 2015 10:00 AM - 6:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzcwMA==\">9\u670818\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70(\u5927\u962a)<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 18, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5927\u962a\u5e02\u5317\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTM4Nw==\">Forrester Analyst Talks Zero Trust in the Software Defined Data Center<\/a><\/p>\n<ul>\n<li>When: September 19, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk3NA==\">Crack the Code<\/a><\/p>\n<ul>\n<li>When: September 22, 2015 8:00 AM - 10:00 AM GMT+8:00<\/li>\n<li>Where: Auckland<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzkzNw==\">Exclusive Data Center Event<\/a><\/p>\n<ul>\n<li>When: September 22, 2015 11:30 AM - 1:30 PM EST<\/li>\n<li>Where: Philadelphia, PA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDAxNA==\">Industrial Control Systems Cybersecurity Workshop<\/a><\/p>\n<ul>\n<li>When: September 22, 2015 9:00 AM - 1:30 PM PST<\/li>\n<li>Where: Vancouver, BC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk3NQ==\">Crack the Code<\/a><\/p>\n<ul>\n<li>When: September 23, 2015 8:00 AM - 10:00 AM GMT+8:00<\/li>\n<li>Where: Wellington<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk1MQ==\">Industrial Control Systems Cybersecurity Workshop<\/a><\/p>\n<ul>\n<li>When: September 23, 2015 9:00 AM - 1:30 PM MST<\/li>\n<li>Where: Calgary, AB<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyMg==\">Palo Alto Networks Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: September 23, 2015 7:00 AM - 11:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzkxNA==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: September 23, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk0OQ==\">Did you miss VMworld?<\/a><\/p>\n<ul>\n<li>When: September 24, 2015 5:30 PM - 7:30 PM EST<\/li>\n<li>Where: New York, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDAxMg==\">Industrial Control Systems Cybersecurity Workshop<\/a><\/p>\n<ul>\n<li>When: September 24, 2015 9:00 AM - 1:30 PM MST<\/li>\n<li>Where: Edmonton, AB<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY5Mw==\">9\u670825\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 25, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzk4Mg==\">\uff74\uff9d\uff84\uff9e\uff95\uff70\uff7b\uff9e\uff70\u69d8\u5411\u3051\uff7e\uff90\uff85\uff70\u300c\u6b21\u4e16\u4ee3\uff8c\uff67\uff72\uff71\uff73\uff6b\uff70\uff99\u3067\u52b9\u7387\u7684\u306b\u7d44\u7e54\u3092\u5b88\u308b\uff01\u300d<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 25, 2015 1:30 PM - 3:00 PM GMT+9:00<\/li>\n<li>Where: \u6e2f\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDA4MQ==\">\uff74\uff9d\uff84\uff9e\uff95\uff70\uff7b\uff9e\uff70\u69d8\u5411\u3051\uff7e\uff90\uff85\uff70\u300c\u9ad8\u5ea6\u306a\u8105\u5a01\u304b\u3089\u7d44\u7e54\u3092\u5b88\u308b\u305f\u3081\u306e\u624b\u6cd5\u3092\u3054\u7d39\u4ecb\u300d<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 25, 2015 4:00 PM - 6:00 PM GMT+9:00<\/li>\n<li>Where: \u6e2f\u533a<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here is all of the top Palo Alto Networks news from this past week. Unit 42\u00a0analyzed Musical Chairs, a multi-year campaign, and unveiled a newly deployed variant of Gh0st malware, \u201cPiano Gh0st.\" &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,1066,203],"tags":[1430,349,621,1438,1439,240,1428,1427,1359,838],"coauthors":[709],"class_list":["post-10275","post","type-post","status-publish","format-standard","hentry","category-events","category-fuel-user-group","category-news-of-the-week","tag-adobe-shockwave-player","tag-cnbc","tag-computing-security-awards","tag-headquarters","tag-information-technology-industry-council","tag-internet-explorer","tag-musical-chairs","tag-piano-gh0st","tag-spark-amsterdam","tag-tsia"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=10275"}],"version-history":[{"count":10,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10275\/revisions"}],"predecessor-version":[{"id":128791,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10275\/revisions\/128791"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=10275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=10275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=10275"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=10275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}