{"id":19721,"date":"2016-09-24T04:00:12","date_gmt":"2016-09-24T11:00:12","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=19721"},"modified":"2016-09-23T13:18:07","modified_gmt":"2016-09-23T20:18:07","slug":"palo-alto-networks-news-of-the-week-september-24-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/09\/palo-alto-networks-news-of-the-week-september-24-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 September 24, 2016"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here.\u00a0 <!--more--><\/p>\n<p>Palo Alto Networks researcher Tao Yan discovered eight new <a href=\"http:\/\/bit.ly\/2cUQYju\" rel=\"nofollow,noopener\" >Adobe Flash Player vulnerabilities<\/a>.<\/p>\n<p>Unit 42 revealed <a href=\"http:\/\/bit.ly\/2cPKEP2\" rel=\"nofollow,noopener\" >Windows Track solutions 7-9<\/a> of the LabyREnth Capture the Flag (CTF) challenge.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Unit-42-banner.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-17410 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Unit-42-banner-500x68.png\" alt=\"Unit 42 banner\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Unit-42-banner.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Unit-42-banner-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Unit-42-banner-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Robert Clark reviewed <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/09\/the-cybersecurity-canon-dark-territory-the-secret-history-of-cyber-war\/\">Dark Territory: The Secret History of Cyber War<\/a> by Fred Kaplan in the latest installment of the Cybersecurity Canon.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/09\/PAN_CyberCanon2016_web_banner_500x85.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:17%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-18778 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/09\/PAN_CyberCanon2016_web_banner_500x85-500x85.jpg\" alt=\"pan_cybercanon2016_web_banner_500x85\" width=\"500\" height=\"85\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/09\/PAN_CyberCanon2016_web_banner_500x85.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/09\/PAN_CyberCanon2016_web_banner_500x85-230x39.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/09\/PAN_CyberCanon2016_web_banner_500x85-235x40.jpg 235w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Mihoko Matsubara <a href=\"http:\/\/bit.ly\/2ct0f1O\" rel=\"nofollow,noopener\" >weighed in with her assessment<\/a> of Japan\u2019s Internet of Things (IoT) security strategy for the Tokyo 2020 Olympic Games.<\/p>\n<p>Sean Morgan shared his thoughts on the Federal Trade Commission\u2019s <a href=\"http:\/\/bit.ly\/2cZCdgp\" rel=\"nofollow,noopener\" >enhanced focus on ransomware prevention<\/a> at the Fall Technology Series workshop.<\/p>\n<p>Sean Duca announced the release of the Australian edition of <a href=\"http:\/\/bit.ly\/2cmlAZO\" rel=\"nofollow,noopener\" ><em>Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers<\/em><\/a>.<\/p>\n<p>Are you attending Microsoft Ignite next week in Atlanta? <a href=\"http:\/\/bit.ly\/2cWd7Nr\" rel=\"nofollow,noopener\" >Experience our prevention architecture in person at booth #2023<\/a> .<\/p>\n<p><a href=\"http:\/\/bit.ly\/2cueQuS\" rel=\"nofollow,noopener\" >Register for Ignite 2017<\/a> by December 31, 2016 and take 100 percent off any single Palo Alto Networks exam of your choice!<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/IGNITE17-HEADER_FOOTER-01.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:36%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-17263 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/IGNITE17-HEADER_FOOTER-01-500x180.png\" alt=\"IGNITE17-HEADER_FOOTER-01\" width=\"500\" height=\"180\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/IGNITE17-HEADER_FOOTER-01-500x180.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/IGNITE17-HEADER_FOOTER-01-230x83.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/IGNITE17-HEADER_FOOTER-01-768x276.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/IGNITE17-HEADER_FOOTER-01-510x184.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/IGNITE17-HEADER_FOOTER-01-111x40.png 111w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/IGNITE17-HEADER_FOOTER-01.png 1250w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-11218 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-500x62.jpg\" alt=\"youre invited\" width=\"500\" height=\"62\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-230x29.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-240x30.jpg 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget\u00a0to register for our new <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/193628\">LIVE-DEMO F\u00dcR EINEN ERWEITERTEN ENDPUNKT-SCHUTZ<\/a><\/p>\n<ul>\n<li>September 27, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/193194\">AutoFocus Event for SOC Leaders<\/a><\/p>\n<ul>\n<li>September 28, 2016<\/li>\n<li>Amsterdam, NL<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/187769\">Cybersecurity, moving at the speed of a Formula 1 car<\/a><\/p>\n<ul>\n<li>September 29, 2016<\/li>\n<li>Montreal, QC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/198853\">Security Day: Financial Services Industry \u2013 Stockholm<\/a><\/p>\n<ul>\n<li>September 29, 2016<\/li>\n<li>Stockholm, Sweden<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/196365\">Live Webinar: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>October 4, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/194149\">Live Demo: Preventing Security Breaches on the EndPoint<\/a><\/p>\n<ul>\n<li>October 5, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/195960\">Next Generation Firewall: Live Demo<\/a><\/p>\n<ul>\n<li>October 5, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/200384\">Preventing Ransomware in Healthcare<\/a><\/p>\n<ul>\n<li>October 5, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201209\">Executive Security Panel: Practitioners\u2019 Look Ahead to 2017 Cyber Preparedness Leadership<\/a><\/p>\n<ul>\n<li>October 6, 2016<\/li>\n<li>Addison, Texas<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/203189\">Die zwei um zwolf: Industry Security<\/a><\/p>\n<ul>\n<li>October 7, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/196366\">Live Webinar: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>October 11, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/infosecuritynl\">Infosecurity Netherlands<\/a><\/p>\n<ul>\n<li>November 2-3, 2016<\/li>\n<li>Utrecht, Netherlands<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here.\u00a0<\/p>\n","protected":false},"author":153,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[251,2698,1819,2142,46,2097,1497,221,2401,586],"coauthors":[1515],"class_list":["post-19721","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-cybersecurity-canon","tag-ftc","tag-ignite","tag-labyrenth","tag-microsoft","tag-mihoko-matsubara","tag-navigating-the-digital-age","tag-ransomware","tag-tokyo-2020","tag-unit-42"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=19721"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19721\/revisions"}],"predecessor-version":[{"id":19730,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19721\/revisions\/19730"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=19721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=19721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=19721"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=19721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}