{"id":10884,"date":"2015-11-07T04:00:54","date_gmt":"2015-11-07T12:00:54","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=10884"},"modified":"2016-02-12T06:08:44","modified_gmt":"2016-02-12T14:08:44","slug":"palo-alto-networks-news-of-the-week-november-7","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/11\/palo-alto-networks-news-of-the-week-november-7\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 November 7"},"content":{"rendered":"<p>Check out the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/news-of-the-week\">Palo Alto Networks news<\/a> from the first week of November.<\/p>\n<p>Unit 42 <a href=\"http:\/\/bit.ly\/1MClmIE\" rel=\"nofollow,noopener\" >detailed its findings of CryptoWall v4<\/a> and <a href=\"http:\/\/bit.ly\/1Pnrrh3\" rel=\"nofollow,noopener\" >published part 2<\/a> of the Connecting the Dots in Cyber Threat Campaigns series: Passive DNS.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10819 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-500x68.png\" alt=\"blog-title-unit42-500x68\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"http:\/\/bit.ly\/1MalbEY\" rel=\"nofollow,noopener\" >New on SecurityRoundtable.org<\/a>: considerations when hiring a CISO and cybersecurity lessons learned. Don\u2019t forget to follow the Security Roundtable on <a href=\"http:\/\/bit.ly\/1HhOQiY\" rel=\"nofollow,noopener\"  target=\"_blank\">LinkedIn<\/a> and <a href=\"https:\/\/twitter.com\/SecurityRT\" rel=\"nofollow,noopener\" >Twitter<\/a> for the latest updates.<!--more--><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/security-roundtable.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10885 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/security-roundtable-500x169.png\" alt=\"security roundtable\" width=\"500\" height=\"169\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/security-roundtable-500x169.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/security-roundtable-230x78.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/security-roundtable-510x173.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/security-roundtable-118x40.png 118w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/security-roundtable.png 974w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"http:\/\/bit.ly\/1GMqFJt\" rel=\"nofollow,noopener\"  target=\"_blank\">WATCH<\/a>: Nir Zuk talked with New York Times President and CEO Mark Thompson about cyber spending, automation and balancing security &amp; compliance.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1GMqFJt\" rel=\"nofollow,noopener\" ><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:56.22%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-10886 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Nir-at-Dealbook.png\" alt=\"Nir at Dealbook\" width=\"498\" height=\"280\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Nir-at-Dealbook.png 498w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Nir-at-Dealbook-230x129.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Nir-at-Dealbook-71x40.png 71w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>VP &amp; CSO-EMEA Greg Day <a href=\"http:\/\/bit.ly\/1Nmj2dM\" rel=\"nofollow,noopener\" >discussed the question<\/a>: Bland information overload or business-critical intelligence?<\/p>\n<p>The Technical Documentation team helps you <a href=\"http:\/\/bit.ly\/1NjC4BA\" rel=\"nofollow,noopener\"  target=\"_blank\">navigate through your Palo Alto Networks configuration with Global Find<\/a>.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1NjC4BA\" rel=\"nofollow,noopener\" ><div style=\"max-width:100%\" data-width=\"493\"><span class=\"ar-custom\" style=\"padding-bottom:48.68%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-10887 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Screen-Shot-2015-11-06-at-3.55.32-PM.png\" alt=\"Screen Shot 2015-11-06 at 3.55.32 PM\" width=\"493\" height=\"240\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Screen-Shot-2015-11-06-at-3.55.32-PM.png 493w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Screen-Shot-2015-11-06-at-3.55.32-PM-230x112.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Screen-Shot-2015-11-06-at-3.55.32-PM-82x40.png 82w\" sizes=\"auto, (max-width: 493px) 100vw, 493px\" \/><\/span><\/div><\/a><\/p>\n<p>Yiftach Keshet began the series \u201c<a href=\"http:\/\/bit.ly\/1OjhG51\" rel=\"nofollow,noopener\" >Exploitation Demystified<\/a>\u201d with the why, what and how.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1Q2JtqG\" rel=\"nofollow,noopener\"  target=\"_blank\">WATCH<\/a>: Ryan Gillis joined MeriTalk for a wide-ranging discussion on the current threat landscape, where government agencies are falling short when preventing known and unknown attacks and more.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1Q2JtqG\" rel=\"nofollow,noopener\" ><div style=\"max-width:100%\" data-width=\"493\"><span class=\"ar-custom\" style=\"padding-bottom:55.98%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-10888 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ryan-at-MeriTalk.png\" alt=\"Ryan at MeriTalk\" width=\"493\" height=\"276\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ryan-at-MeriTalk.png 493w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ryan-at-MeriTalk-230x129.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ryan-at-MeriTalk-71x40.png 71w\" sizes=\"auto, (max-width: 493px) 100vw, 493px\" \/><\/span><\/div><\/a><\/p>\n<p>Check out this week's <a href=\"http:\/\/bit.ly\/1LTaLMc\" rel=\"nofollow,noopener\"  target=\"_blank\">Channel Scoop update<\/a>.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1LTaLMc\" rel=\"nofollow,noopener\" ><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-10802 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\" alt=\"PAN_ChannelScoop_Blog\" width=\"498\" height=\"269\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg 498w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-230x124.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>Registration for the upcoming <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/10\/registration-is-open-spark-user-summits-in-amsterdam-and-boston\/\">Fuel User Group Spark User Summits in Boston &amp; Amsterdam<\/a> is now open.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark_user_summit.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:61.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9926 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark_user_summit-500x309.png\" alt=\"spark_user_summit\" width=\"500\" height=\"309\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark_user_summit-500x309.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark_user_summit-230x142.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark_user_summit-485x300.png 485w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark_user_summit-65x40.png 65w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark_user_summit.png 519w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-10889 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-500x62.jpg\" alt=\"phpThumb_generated_thumbnailjpg\" width=\"500\" height=\"62\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-230x28.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-510x63.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-240x30.jpg 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg.jpg 728w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDQzNg==\">10 Things your Cybersecurity Solution Must Do<\/a><\/p>\n<ul>\n<li>When: November 10, 2015 12:30 PM \u2013 2:00 PM GMT+10:00<\/li>\n<li>Where: North Sydney, NSW<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDI2Mg==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: November 11, 2015 9:00 AM \u2013 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUyNg==\">Prevenga Ciber-amenazas con Palo Alto Networks<\/a> [Spanish]<\/p>\n<ul>\n<li>When: November 12, 2015 9:00 AM - 1:00 PM CST<\/li>\n<li>Where: Monterrey, Nuevo Le\u00f3n, NL<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0Mw==\">11\u670813\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: November 13, 2015 1:30 PM \u2013 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUzNg==\">Die Zwei um Zw\u00f6lf: Threat Prevention - Best Practices<\/a> [German]<\/p>\n<ul>\n<li>When: November 13, 2015 12:00 PM - 1:00 PM MEZ<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDQyMw==\">How to Architect \u201cZero Trust\u201d Network Segmentation in ICS<\/a><\/p>\n<ul>\n<li>When: November 17, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0Nw==\">11\u670818\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: November 18, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDQyMg==\">Healthcare Cybersecurity Seminar Omaha<\/a><\/p>\n<ul>\n<li>When: November 18, 2015 11:30 AM - 1:30 PM CST<\/li>\n<li>Where: Omaha, NE<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUxMw==\">Healthcare Cybersecurity Seminar Omaha (Choice Solutions)<\/a><\/p>\n<ul>\n<li>When: November 18, 2015 11:30 AM - 1:30 PM CST<\/li>\n<li>Where: Omaha, NE<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDI2Mw==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: November 18, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY4NQ==\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: November 18, 2015 9:30 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUyOA==\">Take the Ultimate Test Drive!<\/a><\/p>\n<ul>\n<li>When: November 19, 2015 10:00 AM - 2:00 PM CST<\/li>\n<li>Where: College Station, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUzNA==\">Ultimate Test Drive workshop<\/a><\/p>\n<ul>\n<li>When: November 19, 2015 9:30 AM - 1:00 PM GMT+11:00<\/li>\n<li>Where: Melbourne, VIC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDQzMQ==\">Security Leaders Roundtable Forum \u2013 Sydney<\/a><\/p>\n<ul>\n<li>When: November 20, 2015 8:00 AM - 9:30 AM GMT+10:00<\/li>\n<li>Where: Sydney, NSW<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Check out the top Palo Alto Networks news from the first week of November. Unit 42 detailed its findings of CryptoWall v4 and published part 2 of the Connecting the Dots in &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[834,1289,589,1499],"coauthors":[1546],"class_list":["post-10884","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-cryptowall","tag-global-find","tag-meritalk","tag-securityroundtable-org"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=10884"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10884\/revisions"}],"predecessor-version":[{"id":12150,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10884\/revisions\/12150"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=10884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=10884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=10884"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=10884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}