{"id":11566,"date":"2015-12-19T04:00:46","date_gmt":"2015-12-19T12:00:46","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11566"},"modified":"2015-12-21T09:52:38","modified_gmt":"2015-12-21T17:52:38","slug":"palo-alto-networks-news-of-the-week-december-19","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/12\/palo-alto-networks-news-of-the-week-december-19\/","title":{"rendered":"Palo Alto Networks News of the Week - December 19"},"content":{"rendered":"<p>Busy with the holidays? We\u2019ve rounded up all of last week\u2019s top news from Palo Alto Networks right here to make it easy to catch up on the latest happenings.<\/p>\n<p>Our experts have published even more 2016 Cybersecurity Predictions:<\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1PGx3mX\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 1<\/a>: Joerg Sieber predicts how changes in marketing trends could impact web-based attacks in 2016.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1QKVwbn\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 2<\/a>: Brian Tokuyoshi predicts that the \u201cwhat\u201d will matter more than the \u201cwho\u201d in mobile security.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1OW2L0P\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 3<\/a>: Matt Keil predicts public cloud security will move into the spotlight.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1N0n2QK\" rel=\"nofollow,noopener\" >Prediction 4<\/a>: Michael Moshiri predicts that growth in exploit-based attacks will require increased emphasis on prevention.<\/li>\n<li><a href=\"http:\/\/bit.ly\/21tluVG\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 5<\/a>: Jonathan Lewis predicts the major trends that will gain prominence for service providers next year.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1HGCAJn\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 6<\/a>: Del Rodillas predicts the rise of mobility in the Industrial Internet of Things, and how attackers will also start to use it to compromise the automation environment.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1PFnV3P\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 7<\/a>: Matt Mellen predicts that healthcare technology advances will open up new attack vectors.<\/li>\n<li><a href=\"http:\/\/bit.ly\/21Nbkj1\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 8<\/a>: Joerg Sieber predicts that rapid adoption of mobile payments will accelerate cybersecurity threats.<\/li>\n<li>New! <a href=\"http:\/\/bit.ly\/1TG9wSI\" rel=\"nofollow,noopener\" >Prediction 9<\/a>: Ryan Olson predicts the changes we can expect in 2016 with regards to the threat landscape.<\/li>\n<li>New! <a href=\"http:\/\/bit.ly\/1RpjB8Y\" rel=\"nofollow,noopener\" >Prediction 10<\/a>: Scott Simkin predicts that cyberthreat intelligence sharing will go mainstream.<\/li>\n<li>New! <a href=\"http:\/\/bit.ly\/1lUhfSY\" rel=\"nofollow,noopener\" >Prediction 11<\/a>: Greg Day looks ahead to cybersecurity trends for the New Year.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-500x175.png\" alt=\"Top-10-Predictions-Banner\" width=\"500\" height=\"175\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-230x81.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-114x40.png 114w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p>Unit 42 found an <a href=\"http:\/\/bit.ly\/1QKNH5s\" rel=\"nofollow,noopener\" >iOS Trojan named TinyV<\/a> that attacks jailbroken devices, and also shared separate findings that the attack on a French Diplomat is <a href=\"http:\/\/bit.ly\/1mcI58v\" rel=\"nofollow,noopener\" >linked to Operation Lotus Blossom<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10819 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-500x68.png\" alt=\"blog-title-unit42-500x68\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks <a href=\"http:\/\/bit.ly\/1QtsD4A\" rel=\"nofollow,noopener\" >honored our Wounded Warriors<\/a> at Army-Navy Football Game.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/IMG_02124.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11510 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/IMG_02124-500x375.jpg\" alt=\"IMG_0212[4]\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/IMG_02124-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/IMG_02124-230x173.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/IMG_02124-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/IMG_02124-53x40.jpg 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/IMG_02124.jpg 2048w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Ben Rothke <a href=\"http:\/\/bit.ly\/1k4XQwH\" rel=\"nofollow,noopener\" >reviewed Ted Koppel's book Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath<\/a> for the Cybersecurity Canon.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11567 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-500x218.png\" alt=\"cybersec-canon-red-500x218\" width=\"500\" height=\"218\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-230x100.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-92x40.png 92w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Only a few more weeks left to get $400 off your Ignite 2016 conference pass. Don\u2019t forget to <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/register-now-for-ignite-2016\/\">register<\/a> before December 31!<\/p>\n<p>Already registered and want to present at the conference? The <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/want-to-present-at-ignite-2016-call-for-papers-is-now-open\/\">Call for Papers<\/a> is open now, so don\u2019t forget to submit before the January 8 deadline.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10919 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png\" alt=\"Ignite 2016\" width=\"500\" height=\"124\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-230x57.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-510x126.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-162x40.png 162w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png 603w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Looking to get caught up on NextWave happenings? We did the information gathering for you! Check out <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/12\/channel-scoop-december-18-2015\/\">this week's Channel Scoop<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10802 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\" alt=\"PAN_ChannelScoop_Blog\" width=\"498\" height=\"269\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg 498w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-230x124.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks <a href=\"http:\/\/bit.ly\/227G5zi\" rel=\"nofollow,noopener\" >Next-Generation Firewalls achieved<\/a> new rigorous Common Criteria certification.<\/p>\n<p>Palo Alto Networks CTO <a href=\"http:\/\/bit.ly\/1YatnQN\" rel=\"nofollow,noopener\" >Nir Zuk welcomed<\/a> new CIO Naveen Zutshi and CISO Lucas Moody.<\/p>\n<p>Palo Alto Networks and Mirantis <a href=\"http:\/\/bit.ly\/1O5QTJP\" rel=\"nofollow,noopener\" >announced their collaboration<\/a> to make OpenStack enterprise class.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11218 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-500x62.jpg\" alt=\"youre invited\" width=\"500\" height=\"62\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-230x29.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-240x30.jpg 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a>\u00a0around the world that you should know about:<\/p>\n<p><a href=\"http:\/\/bit.ly\/1TLtBY7\" rel=\"nofollow,noopener\" >Secure the Force: Protect Your Network Like a Jedi Master<\/a><\/p>\n<ul>\n<li>December 22, 2015 11:00 AM - 12:00 PM PT<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU3MA==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>December 23, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDYyOA==\">\u05e1\u05d5\u05d2\u05e8\u05d9\u05dd \u05d0\u05ea \u05d4\u05e9\u05e0\u05d4 \u05d1\u05de\u05e4\u05d2\u05e9 \u05d4\u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05e9\u05dc \u05e4\u05d0\u05dc\u05d5 \u05d0\u05dc\u05d8\u05d5 \u05e0\u05d8\u05d5\u05d5\u05e8\u05e7\u05e1<\/a><\/p>\n<ul>\n<li>December 23, 2015 9:00 AM - 1:30 PM GMT+2:00<\/li>\n<li>Tel-Aviv<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0NQ==\">12\u670825\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a><\/p>\n<ul>\n<li>December 25, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>\u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDY4MQ==\">Kill Chain - Siber Atak Zinciri Web Semineri<\/a><\/p>\n<ul>\n<li>December 29, 2015 10:00 AM - 11:00 AM EET<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU3MQ==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>December 30, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Busy with the holidays? We\u2019ve rounded up all of last week\u2019s top news from Palo Alto Networks right here to make it easy to catch up on the latest happenings. Our experts &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1659,251,1643,1645,1642,1648,1658],"coauthors":[1546],"class_list":["post-11566","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-common-criteria","tag-cybersecurity-canon","tag-lucas-moody","tag-mirantis","tag-naveen-zutshi","tag-tinyv","tag-wounded-warriors"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11566"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11566\/revisions"}],"predecessor-version":[{"id":11568,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11566\/revisions\/11568"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11566"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}