{"id":11583,"date":"2015-12-31T05:00:58","date_gmt":"2015-12-31T13:00:58","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11583"},"modified":"2015-12-22T19:45:54","modified_gmt":"2015-12-23T03:45:54","slug":"palo-alto-networks-2015-year-in-review","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/12\/palo-alto-networks-2015-year-in-review\/","title":{"rendered":"Palo Alto Networks 2015 Year in Review"},"content":{"rendered":"<p class=\"title\">It's been another exciting year here at Palo Alto Networks -- chock full of big news, interesting events, and groundbreaking research. Let's take a look back at some of the top-performing content and most interesting news from the past year.<!--more--><\/p>\n<h3 class=\"title\">Announcements &amp; Accolades<\/h3>\n<p class=\"title\">We had no shortage of announcements and accolades in 2015, which made it hard to track down the top announcements of the year. But, after much debate, we narrowed it down to two key milestones.<\/p>\n<p class=\"title\">In April, Palo Alto Networks was recognized for the fourth time as a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/palo-alto-networks-now-a-four-time-gartner-magic-quadrant-leader\/\" target=\"_blank\">Gartner Magic Quadrant Leader<\/a>. In September, we <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/09\/breaking-ground-on-a-new-home-for-palo-alto-networks\/\">broke ground on our brand new headquarters<\/a> in Santa Clara to accommodate more than 5,000 workers, giving us the space we need to keep growing.<\/p>\n<p class=\"title\">For those who want to relive even more of the big news of 2015, you can read about\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/award\/\" target=\"_blank\">the other accolades<\/a> Palo Alto Networks received and more <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/announcement\/\" target=\"_blank\">announcements<\/a> from 2015.<\/p>\n<h3 class=\"title\">Unit 42 threat intelligence<\/h3>\n<p class=\"title\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/unit42\/\" target=\"_blank\">Unit 42<\/a> had a busy year researching threats left and right. Two of the top-performing pieces of research from 2015 were <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/09\/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store\/\" target=\"_blank\">XcodeGhost<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/08\/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia\/\" target=\"_blank\">KeyRaider<\/a>. Check out the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/12\/the-threat-intelligence-research-that-mattered-to-you-this-year\/\" target=\"_blank\">rest of Unit 42's top research<\/a> from the past year.<\/p>\n<p class=\"title\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10819 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-500x68.png\" alt=\"blog-title-unit42-500x68\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<h3 class=\"title\">Cybersecurity Canon<\/h3>\n<p class=\"title\">2015 saw a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/07\/cybersecurity-canon-2016-get-cracking-on-your-reviews\/\" target=\"_blank\">newly formed Cybersecurity Canon committee<\/a> who published a regular series of book reviews, including:<\/p>\n<ul>\n<li class=\"title\">Ben Rothke's review of <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/08\/the-cybersecurity-canon-the-code-book-the-science-of-secrecy-from-ancient-egypt-to-quantum-cryptography\/\" target=\"_blank\">The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography<\/a><\/li>\n<li class=\"title\">Rick Howard's review of\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/01\/cybersecurity-canon-cyber-warfare-techniques-tactics-tools-security-practitioners\/\" target=\"_blank\">Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners<\/a><\/li>\n<li class=\"title\">Robert Clark's review of\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/07\/the-cybersecurity-canon-tallinn-manual-on-the-international-law-applicable-to-cyber-warfare\/\" target=\"_blank\">Tallinn Manual on the International Law Applicable to Cyber Warfare<\/a><\/li>\n<li class=\"title\">Brian Kelly's review of\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/12\/the-cybersecurity-canon-metasploit-the-penetration-testers-guide\/\" target=\"_blank\">Metasploit: The Penetration Tester\u2019s Guide<\/a><\/li>\n<li class=\"title\">Christina\u00a0Ayiotis' review of\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/10\/the-cybersecurity-canon-locked-down-information-security-for-lawyers\/\" target=\"_blank\">Locked Down: Information Security for Lawyers<\/a><\/li>\n<li class=\"title\">Dawn-Marie Hutchinson's review of\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/the-cybersecurity-canon-the-illusion-of-due-diligence-notes-from-the-ciso-underground\/\" target=\"_blank\">The Illusion of Due Diligence: Notes from the CISO Underground<\/a><\/li>\n<li class=\"title\">Hannah Kuchler's review of\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/09\/the-cybersecurity-canon-the-internet-police-how-crime-went-online-and-the-cops-followed\/\" target=\"_blank\">The Internet Police: How Crime Went Online, and the Cops Followed<\/a><\/li>\n<li class=\"title\">Jon Oltsik's review of\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/07\/the-cybersecurity-canon-the-florentine-deception\/\" target=\"_blank\">The Florentine Deception<\/a><\/li>\n<li class=\"title\">Steve Winterfeld's review of\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/10\/the-cybersecurity-canon-data-and-goliath-the-hidden-battles-to-collect-your-data-and-control-your-world\/\">Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World<\/a><\/li>\n<\/ul>\n<p class=\"title\">Read\u00a0the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\">rest of the book reviews<\/a>\u00a0from\u00a0the <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\" target=\"_blank\">Cybersecurity Canon<\/a> <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/cyber-security-canon-bios.html\" target=\"_blank\">committee<\/a>, and check out\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/canon-award-winners.html\" target=\"_blank\">the Canon award winners<\/a>.<\/p>\n<p class=\"title\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11567 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-500x218.png\" alt=\"cybersec-canon-red-500x218\" width=\"500\" height=\"218\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-230x100.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-92x40.png 92w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<h3 class=\"title\">2016 Predictions<\/h3>\n<p>As we look to 2016, our experts across verticals and business units published a\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/predictions\/\" target=\"_blank\">series of cybersecurity predictions<\/a>. Here are some of the top posts:<\/p>\n<ul>\n<li>Michael Moshiri <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/2016-predictions-4-growth-in-exploit-based-attacks-will-require-increased-emphasis-on-prevention\/\" target=\"_blank\">predicts<\/a> that growth in exploit-based attacks will require increased emphasis on prevention.<\/li>\n<li>Joerg Sieber <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/2016-prediction-1-online-marketing-trends-will-change-web-based-threats-slightly\/\" target=\"_blank\">predicts<\/a> how changes in marketing trends could impact web-based attacks in 2016.<\/li>\n<li>Jonathan Lewis <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/12\/2016-predictions-5-industrial-iot-and-nfvsdn-growth-and-public-cloud-to-yield-emerging-security-opportunities-for-service-providers\/\" target=\"_blank\">predicts<\/a> the major trends that will gain prominence for service providers next year.<\/li>\n<\/ul>\n<p class=\"title\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/12\/2016-predictions-whats-in-store-for-cybersecurity\/\" target=\"_blank\">Check out the rest of the 2016 predictions<\/a>.<\/p>\n<p class=\"title\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-500x175.png\" alt=\"Top-10-Predictions-Banner\" width=\"500\" height=\"175\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-230x81.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-114x40.png 114w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<h3 class=\"title\">Ignite 2015<\/h3>\n<p class=\"title\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/ignite-2015\/\" target=\"_blank\">Ignite 2015<\/a>\u00a0was our biggest one\u00a0yet, and we are thankful for all of our great customers and attendees. The <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/check-it-out-ignite-2015-in-pictures\/\" target=\"_blank\">week-long event<\/a> featured <a href=\"https:\/\/www.facebook.com\/media\/set\/?set=a.10152788229607711.1073741858.89662002710&amp;type=1\" rel=\"nofollow,noopener\"  target=\"_blank\">the MythBusters, the Most Interesting Man in the World<\/a>, and\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/congratulations-to-this-years-cybersecurity-canon-honorees\/\" target=\"_blank\">new inductees to the Cybersecurity Canon<\/a>.<\/p>\n<p class=\"title\">You can relive the excitement by watching keynotes from <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/05\/mark-mclaughlin-at-ignite-2015-security-is-becoming-a-fabric-item-for-enterprises-and-organizations\/\" target=\"_blank\">CEO Mark McLaughlin<\/a>, <a href=\"https:\/\/www.youtube.com\/watch?v=exFoNvmHrB4&amp;feature=youtu.be\" rel=\"nofollow,noopener\"  target=\"_blank\">CTO Nir Zuk<\/a> and\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/06\/lee-klarich-at-ignite-2015-were-preventing-advanced-attacks-not-just-detecting-them\/\" target=\"_blank\">EVP of Product Management Lee Klarich<\/a>, and <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/ignite-2015-survey\/\" target=\"_blank\">check out the results from the survey<\/a> we conducted of attendees.<\/p>\n<p class=\"title\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:30.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8237 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200-500x151.jpg\" alt=\"email_banner_PAN_Ignite_660x200\" width=\"500\" height=\"151\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200-500x151.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200-230x69.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200-510x154.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200-132x40.jpg 132w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200.jpg 660w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p class=\"title\">Want to attend <a href=\"http:\/\/paloaltonetworksignite.com\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Ignite 2016<\/a>?\u00a0<a href=\"https:\/\/boom.weboom.com\/sites\/paloaltonetworks\/ignite2016\/forms\/regform.html\" rel=\"nofollow,noopener\"  target=\"_blank\">Register now<\/a> to get early bird pricing and save $400 (<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/register-now-for-ignite-2016\/\" target=\"_blank\">ends today, December 31<\/a>).<\/p>\n<p class=\"title\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10919 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png\" alt=\"Ignite 2016\" width=\"500\" height=\"124\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-230x57.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-510x126.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-162x40.png 162w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png 603w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<h3 class=\"title\">Cyber Threat Alliance<\/h3>\n<p class=\"title\">The <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cyber-threat-alliance\/\" target=\"_blank\">Cyber Threat Alliance<\/a> expanded with <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/02\/expanding-cyber-threat-alliance\/\" target=\"_blank\">additional members<\/a> and the founders <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/01\/cnbc-talks-cyber-threat-alliance-taking-fight-cyberattackers\/\" target=\"_blank\">went on CNBC\u2019s Squawk Alley<\/a>\u00a0to discuss\u00a0how collaboration between security companies is helping customers in the ongoing battle against cyberattackers. <a href=\"http:\/\/cyberthreatalliance.org\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Learn more about the Alliance<\/a>.<br \/>\n<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/Cyber-Threat-Alliance.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:46.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11606 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/Cyber-Threat-Alliance-500x231.png\" alt=\"Cyber Threat Alliance\" width=\"500\" height=\"231\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/Cyber-Threat-Alliance-500x231.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/Cyber-Threat-Alliance-230x106.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/Cyber-Threat-Alliance-510x235.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/Cyber-Threat-Alliance-87x40.png 87w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/Cyber-Threat-Alliance.png 587w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<h3 class=\"p1\"><span class=\"s1\">We hope\u00a0you enjoyed <\/span>this trip down memory lane<span class=\"s1\">. W<\/span>e look forward to more great things in 2016!<\/h3>\n<p class=\"title\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/Cyber-Threat-Alliance-Logo.png\"><br \/>\n<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It's been another exciting year here at Palo Alto Networks -- chock full of big news, interesting events, and groundbreaking research. Let's take a look back at some of the top-performing content &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,155],"tags":[1667,662,251,1155,396,1133],"coauthors":[1546],"class_list":["post-11583","post","type-post","status-publish","format-standard","hentry","category-announcement","category-cybersecurity-2","tag-2016-predictions","tag-cyber-threat-alliance","tag-cybersecurity-canon","tag-gartner-magic-quadrant","tag-ignite-2015","tag-ignite-2016"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11583"}],"version-history":[{"count":20,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11583\/revisions"}],"predecessor-version":[{"id":11642,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11583\/revisions\/11642"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11583"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}