{"id":14986,"date":"2016-06-25T04:00:38","date_gmt":"2016-06-25T11:00:38","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=14986"},"modified":"2016-06-27T10:34:16","modified_gmt":"2016-06-27T17:34:16","slug":"palo-alto-networks-news-of-the-week-june-25-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/06\/palo-alto-networks-news-of-the-week-june-25-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013June 25, 2016"},"content":{"rendered":"<p>Now is your chance to catch up on all of our top news from this past week.<\/p>\n<p>Unit 42 tracked <a href=\"http:\/\/bit.ly\/28TMlsC\" rel=\"nofollow,noopener\"  target=\"_blank\">Elirks variants in Japan<\/a> and uncovered similarities to previous attacks using the same malware family.<\/p>\n<p>You have less than one month to prepare for the first ever Unit 42 Capture the Flag (CTF) challenge: <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/06\/unit-42-countdown-to-labyrenth-capture-the-flag-ctf-challenge\/\" target=\"_blank\">LabyREnth<\/a>!<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-2.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-14989 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-2-500x68.png\" alt=\"Unit-42-banner-1 (2)\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-2.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-2-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-2-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p>Greg Day, our CSO for EMEA, was recently at InfoSec Europe 2016 talking about the Palo Alto Networks <a href=\"http:\/\/bit.ly\/23kTHGM\" rel=\"nofollow,noopener\"  target=\"_blank\">Next-Generation Security Platform<\/a>, <a href=\"http:\/\/bit.ly\/1tE6rfG\" rel=\"nofollow,noopener\"  target=\"_blank\">Traps<\/a>, and what to expect from EU cyber legislation changes.<\/p>\n<p>Our relationship with <a href=\"http:\/\/bit.ly\/23gDkuA\" rel=\"nofollow,noopener\"  target=\"_blank\">VMware AirWatch<\/a> now includes Aperture.<\/p>\n<p>Palo Alto Networks won the <a href=\"http:\/\/bit.ly\/28K9R6L\" rel=\"nofollow,noopener\"  target=\"_blank\">Next Generation Firewall award<\/a> category for NetworkWorld Asia\u2019s (NWA) 5th annual Information Management Awards 2016.<\/p>\n<p>Learn about the need to isolate remote, wide-area communications into a separate zone and other <a href=\"http:\/\/bit.ly\/28Lt4Ue\" rel=\"nofollow,noopener\"  target=\"_blank\">useful strategies<\/a> to better secure your ICS and SCADA networks.<\/p>\n<p>Learn how to prevent targeted phishing attacks with Palo Alto Networks PAN-DB, WildFire &amp; our next-generation firewalls in this <a href=\"http:\/\/bit.ly\/28SetL3\" rel=\"nofollow,noopener\"  target=\"_blank\">Lightboard session<\/a>.<\/p>\n<p>Watch the latest \"People of Palo Alto Networks\" featuring Unit 42 Cyber Threat Intelligence Analyst, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/06\/people-of-palo-alto-networks-kaoru-hayashi\/\" target=\"_blank\">Kaoru Hayashi<\/a>, and learn how he fights the good fight at Palo Alto Networks.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/phpThumb_generated_thumbnailjpg-500x62-1-1.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-14992 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/phpThumb_generated_thumbnailjpg-500x62-1-1-500x62.jpg\" alt=\"phpThumb_generated_thumbnailjpg-500x62-1\" width=\"500\" height=\"62\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/phpThumb_generated_thumbnailjpg-500x62-1-1.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/phpThumb_generated_thumbnailjpg-500x62-1-1-230x29.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/phpThumb_generated_thumbnailjpg-500x62-1-1-240x30.jpg 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here Are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">Upcoming Events<\/a>\u00a0Around The World That You Should Know About:<\/p>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTYwMA==\" target=\"_blank\">Palo Alto Networks -Virtual Ultimate Test Drive NGFW June 27,2016<\/a><\/p>\n<ul>\n<li>June 27, 2016 11:00 AM - 1:00 PM GMT+8:00<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTYwMA==\" target=\"_blank\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>June 29, 2016 11:00 AM - 12:00 PM PST<br \/>\nOnline Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTc2MQ==\" target=\"_blank\">Nowe Rozwiazanie Palo Alto Networks Autofocus Threat Intelligence<\/a><\/p>\n<ul>\n<li>June 29, 2016 11:00 AM - 12:00 PM EET<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTYwMQ==\" target=\"_blank\">Palo Alto Networks - Virtual Ultimate Test Drive VDC June 29, 2016<\/a><\/p>\n<ul>\n<li>June 29, 2016 1:00 PM - 3:00 PM GMT+8:00<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTU4Ng==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>June 29, 2016 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTQxMw==\" target=\"_blank\">Ultimate Test Drive - Migration Process<\/a><\/p>\n<ul>\n<li>June 30, 2016 9:30 AM - 1:00 PM CET<\/li>\n<li>Issy Les Moulineaux<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTYwMg==\" target=\"_blank\">Virtual Ultimate Test Drive MP June 30, 2016<\/a><\/p>\n<ul>\n<li>June 30, 2016 11:00 AM - 1:00 PM GMT+8:00<\/li>\n<li>Online Event<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Now is your chance to catch up on all of our top news from this past week. Unit 42 tracked Elirks variants in Japan and uncovered similarities to previous attacks using the &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1440,2152,411,2164,1243,92,2161],"coauthors":[1546],"class_list":["post-14986","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-aperture","tag-elirks","tag-ics","tag-infosec-europe-2016","tag-networkworld-asia","tag-scada","tag-vmware-airwatch"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=14986"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14986\/revisions"}],"predecessor-version":[{"id":15022,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14986\/revisions\/15022"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=14986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=14986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=14986"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=14986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}