{"id":11614,"date":"2016-01-02T04:00:27","date_gmt":"2016-01-02T12:00:27","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11614"},"modified":"2015-12-29T16:10:07","modified_gmt":"2015-12-30T00:10:07","slug":"palo-alto-networks-news-of-the-week-january-2","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/01\/palo-alto-networks-news-of-the-week-january-2\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 January 2"},"content":{"rendered":"<p>Happy New Year!<\/p>\n<p>We celebrated this week by taking\u00a0a look back at some of the top-performing content and most interesting news from the past year. <a href=\"http:\/\/bit.ly\/1PjtodC\" rel=\"nofollow,noopener\"  target=\"_blank\">Check out\u00a0<\/a><span data-sheets-value=\"[null,2,&quot;Palo Alto Networks 2015 Year in Review http:\/\/bit.ly\/1PjtodC&quot;]\" data-sheets-userformat=\"[null,null,4799,[null,0],[null,2,15374745],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],null,2,null,0,null,null,&quot;arial,sans,sans-serif&quot;]\"><a href=\"http:\/\/bit.ly\/1PjtodC\" rel=\"nofollow,noopener\"  target=\"_blank\">Palo Alto Networks 2015 Year in Review<\/a>.<\/span><\/p>\n<p>We also published\u00a0the\u00a0final Palo Alto Networks expert <a href=\"http:\/\/bit.ly\/1V5nAH0\" rel=\"nofollow,noopener\"  target=\"_blank\">2016 prediction<\/a>:<!--more--><\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1PGx3mX\" rel=\"nofollow,noopener\" >Prediction 1<\/a>: Joerg Sieber predicts how changes in marketing trends could impact web-based attacks in 2016.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1QKVwbn\" rel=\"nofollow,noopener\" >Prediction 2<\/a>: Brian Tokuyoshi predicts that the \u201cwhat\u201d will matter more than the \u201cwho\u201d in mobile security.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1OW2L0P\" rel=\"nofollow,noopener\" >Prediction 3<\/a>: Matt Keil predicts public cloud security will move into the spotlight.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1N0n2QK\" rel=\"nofollow,noopener\" >Prediction 4<\/a>: Michael Moshiri predicts that growth in exploit-based attacks will require increased emphasis on prevention.<\/li>\n<li><a href=\"http:\/\/bit.ly\/21tluVG\" rel=\"nofollow,noopener\" >Prediction 5<\/a>: Jonathan Lewis predicts the major trends that will gain prominence for service providers next year.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1HGCAJn\" rel=\"nofollow,noopener\" >Prediction 6<\/a>: Del Rodillas predicts the rise of mobility in the Industrial Internet of Things, and how attackers will also start to use it to compromise the automation environment.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1PFnV3P\" rel=\"nofollow,noopener\" >Prediction 7<\/a>: Matt Mellen predicts that healthcare technology advances will open up new attack vectors.<\/li>\n<li><a href=\"http:\/\/bit.ly\/21Nbkj1\" rel=\"nofollow,noopener\" >Prediction 8<\/a>: Joerg Sieber predicts that rapid adoption of mobile payments will accelerate cybersecurity threats.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1TG9wSI\" rel=\"nofollow,noopener\" >Prediction 9<\/a>: Ryan Olson predicts the changes we can expect in 2016 with regards to the threat landscape.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1RpjB8Y\" rel=\"nofollow,noopener\" >Prediction 10<\/a>: Scott Simkin predicts that cyberthreat intelligence sharing will go mainstream.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1lUhfSY\" rel=\"nofollow,noopener\" >Prediction 11<\/a>: Greg Day looks ahead to cybersecurity trends for the New Year.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1UGlKw2\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 12<\/a>:\u00a0Will Howerton predicts executives will embrace accountability and action.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1QWbUpr\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 13<\/a>:\u00a0Glenn\u00a0Dasmalchi predicts\u00a0there will be\u00a0security with agility for firewalls and applications.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1Ioi4xq\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 14<\/a>:\u00a0Sean Duca details\u00a0six\u00a0cybersecurity predictions for Asia Pacific.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-500x175.png\" alt=\"Top-10-Predictions-Banner\" width=\"500\" height=\"175\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-230x81.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-114x40.png 114w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Josh Grunzweig from the Unit 42 threat intelligence team kicked off a series on <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/idapython\/\">how to use\u00a0IDAPython to make your life easier<\/a>.<\/p>\n<p><span data-sheets-value=\"[null,2,&quot;The Unit 42 threat intelligence research that mattered to you this year http:\/\/bit.ly\/1OmBZPN&quot;]\" data-sheets-userformat=\"[null,null,575,[null,0],[null,2,16043212],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],null,null,null,0]\">The <a href=\"http:\/\/bit.ly\/1OmBZPN\" rel=\"nofollow,noopener\"  target=\"_blank\">Unit 42 threat intelligence research that mattered to you<\/a> this year was rounded up.<\/span><\/p>\n<p><span data-sheets-value=\"[null,2,&quot;Palo Alto Networks VP, CSO-EMEA Greg Day discusses the question: Where are we in the endpoint journey? http:\/\/bit.ly\/1lUwY4u&quot;]\" data-sheets-userformat=\"[null,null,575,[null,0],[null,2,15374745],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],[null,[[null,2,0,null,null,[null,2,0]],[null,0,0,3],[null,1,0,null,1]]],null,null,null,0]\">Palo Alto Networks VP, CSO-EMEA <a href=\"http:\/\/bit.ly\/1lUwY4u\" rel=\"nofollow,noopener\"  target=\"_blank\">Greg Day discussed the question<\/a>: Where are we in the endpoint journey?<\/span><\/p>\n<p>The deadline for the Ignite 2016\u00a0Call for Papers is coming up quick. <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/want-to-present-at-ignite-2016-call-for-papers-is-now-open\/\">Submit your paper<\/a>\u00a0before January 8!<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10919 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png\" alt=\"Ignite 2016\" width=\"500\" height=\"124\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-230x57.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-510x126.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-162x40.png 162w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png 603w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11218 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-500x62.jpg\" alt=\"youre invited\" width=\"500\" height=\"62\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-230x29.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-240x30.jpg 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a>\u00a0around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU3Mg==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>January 6, 2016 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDczOA==\" target=\"_blank\">Virtualized Data Center Workshop with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>January 6, 2016 8:30 AM - 1:00 PM EST<\/li>\n<li>New York, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDc0MQ==\" target=\"_blank\">Take The Ultimate Next-Generation Firewall Test Drive - Dubai<\/a><\/p>\n<ul>\n<li>January 12, 2016 9:00 AM - 2:00 PM GMT+3:00<\/li>\n<li>Dubai<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDY0Ng==\" target=\"_blank\">New Year's Party<\/a><\/p>\n<ul>\n<li>January 13, 2016 6:00 PM - 8:00 PM GMT+9:00<\/li>\n<li>\u6e2f\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU3Mw==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>January 13, 2016 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/bit.ly\/1MrukrP\" rel=\"nofollow,noopener\"  target=\"_blank\">Actionable Threat Intelligence \u2013 The Power to Act Fast!<\/a><\/p>\n<ul>\n<li>January 14, 2016 11:00 AM - 12:00 PM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.bizjournals.com\/sanjose\/event\/138712\" rel=\"nofollow,noopener\"  target=\"_blank\">Navigating Cyber Risk<\/a><\/p>\n<ul>\n<li>January 14, 2016\u00a010:00 AM\u00a0- 1:00 PM PST<\/li>\n<li>Palo Alto, CA<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Happy New Year! We celebrated this week by taking\u00a0a look back at some of the top-performing content and most interesting news from the past year. Check out\u00a0Palo Alto Networks 2015 Year in &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1133],"coauthors":[1546],"class_list":["post-11614","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-ignite-2016"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11614"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11614\/revisions"}],"predecessor-version":[{"id":11715,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11614\/revisions\/11715"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11614"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}