{"id":11469,"date":"2015-12-12T04:00:16","date_gmt":"2015-12-12T12:00:16","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11469"},"modified":"2015-12-11T17:23:12","modified_gmt":"2015-12-12T01:23:12","slug":"palo-alto-networks-news-of-the-week-december-12","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/12\/palo-alto-networks-news-of-the-week-december-12\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 December 12"},"content":{"rendered":"<p>Read up on all the happenings at Palo Alto Networks this past week.<\/p>\n<p>We added to our 2016 Cybersecurity Predictions series:<\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1PGx3mX\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 1<\/a>: Joerg Sieber predicts how changes in marketing trends could impact web-based attacks in 2016.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1QKVwbn\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 2<\/a>: Brian Tokuyoshi predicts that the \u201cwhat\u201d will matter more than the \u201cwho\u201d in mobile security.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1OW2L0P\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 3<\/a>: Matt Keil predicts public cloud security will move into the spotlight.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1N0n2QK\" rel=\"nofollow,noopener\" >Prediction 4<\/a>: Michael Moshiri predicts that growth in exploit-based attacks will require increased emphasis on prevention.<\/li>\n<li><a href=\"http:\/\/bit.ly\/21tluVG\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 5<\/a>: Jonathan Lewis predicts the major trends that will gain prominence for service providers next year.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1HGCAJn\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 6<\/a>: Del Rodillas predicts the rise of mobility in the Industrial Internet of Things, and how attackers will also start to use it to compromise the automation environment.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1PFnV3P\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 7<\/a>: Matt Mellen predicts that healthcare technology advances will open up new attack vectors.<\/li>\n<li><a href=\"http:\/\/bit.ly\/21Nbkj1\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 8<\/a>: Joerg Sieber predicts that rapid adoption of mobile payments will accelerate cybersecurity threats.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-500x175.png\" alt=\"Top-10-Predictions-Banner\" width=\"500\" height=\"175\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-230x81.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-114x40.png 114w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/register-now-for-ignite-2016\/\" target=\"_blank\">Register<\/a> before December 31 for $400 off your Ignite 2016 conference pass. Also, the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/want-to-present-at-ignite-2016-call-for-papers-is-now-open\/\" target=\"_blank\">Call for Papers<\/a> is open so don\u2019t forget to submit! The deadline is January 8.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10919 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png\" alt=\"Ignite 2016\" width=\"500\" height=\"124\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-230x57.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-510x126.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-162x40.png 162w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png 603w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Join the Palo Alto Networks Unit 42 Threat Intelligence team on December 17 from 10:00-11:00 a.m. PT for a Twitter chat. <a href=\"http:\/\/bit.ly\/1TZRiwj\" rel=\"nofollow,noopener\"  target=\"_blank\">Join in on the discussion<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10819 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-500x68.png\" alt=\"blog-title-unit42-500x68\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Unit 42 found <a href=\"http:\/\/bit.ly\/1N8XEF9\" rel=\"nofollow,noopener\"  target=\"_blank\">BackStab<\/a>: mobile backup data under attack from malware on both Windows and Mac OS.<\/p>\n<p>Palo Alto Networks researchers were credited with <a href=\"http:\/\/bit.ly\/1NgSnLP\" rel=\"nofollow,noopener\"  target=\"_blank\">discovering a new vulnerability that impacts Apple\u2019s major products<\/a>, as well as <a href=\"http:\/\/bit.ly\/1IFzUfg\" rel=\"nofollow,noopener\"  target=\"_blank\">critical vulnerabilities in Internet Explorer and Microsoft Edge<\/a>.<\/p>\n<p>Episode 5 of <a href=\"http:\/\/bit.ly\/1lv9W44\" rel=\"nofollow,noopener\"  target=\"_blank\">People of Palo Alto Networks spotlighted Tim Heraldo<\/a>, a face that may be familiar to you if you saw this year's Gartner Magic Quadrant promotions.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog.jpg\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10643 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog.jpg\" alt=\"PAN_Culture_Blog\" width=\"498\" height=\"269\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog.jpg 498w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog-230x124.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks Academy <a href=\"http:\/\/bit.ly\/1OiXVVL\" rel=\"nofollow,noopener\"  target=\"_blank\">expanded into India with new ICT Academy<\/a> (ICTACT) agreement.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/SS9A2941.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11370 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/SS9A2941-500x334.jpg\" alt=\"SS9A2941\" width=\"500\" height=\"334\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/SS9A2941-500x334.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/SS9A2941-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/SS9A2941-450x300.jpg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/SS9A2941-60x40.jpg 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/SS9A2941.jpg 1000w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>This month\u2019s Customer Spotlight <a href=\"http:\/\/bit.ly\/1IQwtNn\" rel=\"nofollow,noopener\"  target=\"_blank\">focused on UNIVEG Trade Italy<\/a> and how the Palo Alto Networks Next-Generation Security Platform helped them freshen up their network security.<\/p>\n<p class=\"p1\">VP and CSO EMEA Greg Day <a href=\"http:\/\/bit.ly\/1ST5iap\" rel=\"nofollow,noopener\"  target=\"_blank\">discussed the NIS Directive<\/a>: One small step for man, one giant leap for digital-society-kind.<\/p>\n<p>\"Stopping threats won\u2019t come from solving the variations of the theme, but rather by addressing the core of the problem itself.\" <a href=\"http:\/\/bit.ly\/21KIwaK\" rel=\"nofollow,noopener\"  target=\"_blank\">Get tips from Brian Tokuyoshi<\/a> on strengthening your mobile security strategy.<\/p>\n<p>Lionel Jacobs explained VLAN Insertion, a technology native to the next-generation firewall and available in every model from the PA-200 to the PA-7080. It allows operators to segment and separate their critical control systems networks from the enterprise with minimal impact to the control systems network. <a href=\"http:\/\/bit.ly\/1NL1BDz\" rel=\"nofollow,noopener\"  target=\"_blank\">Learn more<\/a>.<\/p>\n<p>Sit back and relax, we did the information gathering for you!\u00a0<a href=\"http:\/\/bit.ly\/1Z447sm\" rel=\"nofollow,noopener\"  target=\"_blank\">Check out this week's Channel Scoop<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10802 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\" alt=\"PAN_ChannelScoop_Blog\" width=\"498\" height=\"269\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg 498w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-230x124.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11218 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-500x62.jpg\" alt=\"youre invited\" width=\"500\" height=\"62\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-230x29.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-240x30.jpg 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a>\u00a0around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/webinar.darkreading.com\/1446?keycode=CAA1AC\" rel=\"nofollow,noopener\"  target=\"_blank\">Why Layered Security Strategies Don\u2019t Work \u2013 And What You Can Do About It<\/a><\/p>\n<ul>\n<li>December 15, 2015 10:00 AM \u2013 11:00 AM PT<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/offers.tanium.com\/Webinar-Palo-Alto-Networks-Tanium-Malicious-Behavior-Detection-at-Scale.html\" rel=\"nofollow,noopener\"  target=\"_blank\">Palo Alto Networks &amp; Tanium: Webinar Malicious Behavior Detection at Scale<\/a><\/p>\n<ul>\n<li>December 16, 2015 10:00 AM \u2013 11:00 AM PT<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0OA==\">12\u670816\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>December 16, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>\u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU2OQ==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>December 16, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDY4Mw==\">Posada Navide\u00f1a, Star Wars, y los ciber-ataques m\u00e1s usados en el 2015<\/a><\/p>\n<ul>\n<li>December 16, 2015 7:00 PM - 11:30 PM CST<\/li>\n<li>San Pedro Garza G., Nuevo Le\u00f3n, NL<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU1NQ==\">Take the Ultimate Test Drive!<\/a><\/p>\n<ul>\n<li>December 16, 2015 1:00 PM - 4:00 PM CST<\/li>\n<li>Maryland Heights , MO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY4Ng==\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>December 16, 2015 9:30 AM - 1:00 PM GMT<\/li>\n<li>London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0MQ==\">12\u670818\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0<\/a><\/p>\n<ul>\n<li>December 18, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>\u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU3MA==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>December 23, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDYyOA==\">\u05e1\u05d5\u05d2\u05e8\u05d9\u05dd \u05d0\u05ea \u05d4\u05e9\u05e0\u05d4 \u05d1\u05de\u05e4\u05d2\u05e9 \u05d4\u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05e9\u05dc \u05e4\u05d0\u05dc\u05d5 \u05d0\u05dc\u05d8\u05d5 \u05e0\u05d8\u05d5\u05d5\u05e8\u05e7\u05e1<\/a><\/p>\n<ul>\n<li>December 23, 2015 9:00 AM - 1:30 PM GMT+2:00<\/li>\n<li>Tel-Aviv<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0NQ==\">12\u670825\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a><\/p>\n<ul>\n<li>December 25, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>\u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Read up on all the happenings at Palo Alto Networks this past week. We added to our 2016 Cybersecurity Predictions series: Prediction 1: Joerg Sieber predicts how changes in marketing trends could &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1621,1636,1133,1630,1626],"coauthors":[1546],"class_list":["post-11469","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-backstab","tag-ict-academy","tag-ignite-2016","tag-twitter-chat","tag-univeg-trade-italy"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11469"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11469\/revisions"}],"predecessor-version":[{"id":11472,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11469\/revisions\/11472"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11469"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}