{"id":20823,"date":"2016-10-08T04:00:23","date_gmt":"2016-10-08T11:00:23","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=20823"},"modified":"2016-10-07T11:41:55","modified_gmt":"2016-10-07T18:41:55","slug":"palo-alto-networks-news-week-october-8-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/10\/palo-alto-networks-news-week-october-8-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 October 8, 2016"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here.<\/p>\n<ul>\n<li>Unit 42 shared new <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/unit42-eitest-campaign-evolution-angler-ek-neutrino-rig\/\" target=\"_blank\">research about EITest<\/a>, a long-running campaign that uses exploit kits to distribute a variety of malware.<\/li>\n<li>Unit 42 also investigated recent <a href=\"http:\/\/bit.ly\/2dGPNDU\" rel=\"nofollow,noopener\"  target=\"_blank\">OilRig malware campaign activity<\/a> and shared details about their updated toolset and new targets.<\/li>\n<li>We released solutions for the <a href=\"http:\/\/bit.ly\/2dWtRcQ\" rel=\"nofollow,noopener\"  target=\"_blank\">Random track<\/a>, the last track of Unit 42\u2019s LabyREnth Capture the Flag challenge.<!--more--><\/li>\n<li>Navneet Singh shared <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/5-steps-to-prevent-data-breaches-due-to-insider-and-privilege-misuse\/\" target=\"_blank\">5 steps for preventing data breaches due to insider and privilege misuse<\/a>.<\/li>\n<li>Coalfire\u2019s third party assessment determined that an organization can achieve <a href=\"http:\/\/bit.ly\/2cNRweP\" rel=\"nofollow,noopener\"  target=\"_blank\">PCI DSS and HIPAA compliance with Traps<\/a> advanced endpoint solution.<\/li>\n<li>Brian Tokuyoshi explained the <a href=\"http:\/\/bit.ly\/2dqeOpn\" rel=\"nofollow,noopener\"  target=\"_blank\">difference between security and remote access<\/a>.<\/li>\n<li>Eila Shargh rounded up some <a href=\"http:\/\/bit.ly\/2dLj99a\" rel=\"nofollow,noopener\"  target=\"_blank\">info and insights on ransomware<\/a> and what should be done to prevent it.<\/li>\n<li>New <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/tech-docs-malware-takes-cover-new-wildfire-cloud-emerges-europe\/\" target=\"_blank\">technical documentation for WildFire EU cloud<\/a> is now available.<\/li>\n<li>Mark McLaughlin spoke about the benefits of a next-generation security platform as well as the need for organizations to continue investing in cybersecurity with <a href=\"http:\/\/bit.ly\/2dvVho5\" rel=\"nofollow,noopener\"  target=\"_blank\">Jim Cramer of CNBC\u2019s Mad Money<\/a>.<\/li>\n<li>Ryan Gillis gave his <a href=\"http:\/\/bit.ly\/2dknxY6\" rel=\"nofollow,noopener\"  target=\"_blank\">recap of the inaugural Track 1.5 Cybersecurity Dialogue<\/a> between government and industry officials from the United States and Australia.<\/li>\n<li>Dawn-Marie Hutchinson reviewed Mansur Hasib\u2019s \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/the-cybersecurity-canon-cybersecurity-leadership-powering-the-modern-organization\/\" target=\"_blank\">Cybersecurity Leadership: Powering the Modern Organization<\/a>\u201d for the Cybersecurity Canon.<\/li>\n<li>Join us in Vancouver June 12-15 for Ignite 2017. <a href=\"http:\/\/bit.ly\/2cueQuS\" rel=\"nofollow,noopener\"  target=\"_blank\">Register today<\/a> and enjoy a 100 percent discount on a Palo Alto Networks exam of your choice!<\/li>\n<\/ul>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our new <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\" target=\"_blank\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/196366\" target=\"_blank\">Live Webinar: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>October 11, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/206214\" target=\"_blank\">Ultimate Test Drive \u2013 Advanced Endpoint Protection \u2013 Belgrade<\/a><\/p>\n<ul>\n<li>October 11, 2016<\/li>\n<li>Belgrade, Serbia<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/204749\" target=\"_blank\">Wine Tasting Reception<\/a><\/p>\n<ul>\n<li>October 11, 2016<\/li>\n<li>Honolulu, Hawaii<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/199404\" target=\"_blank\">A Look Ahead to the Cyber Security Landscape in 2017<\/a><\/p>\n<ul>\n<li>October 12, 2016<\/li>\n<li>Beverly Hills, California<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201315\" target=\"_blank\">NSX Roadshow<\/a><\/p>\n<ul>\n<li>October 12, 2016<\/li>\n<li>Independence, Ohio<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/195975\" target=\"_blank\">NGFW: Next Generation Firewall Live Demo\u00a0 <\/a><\/p>\n<ul>\n<li>October 12, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201320\" target=\"_blank\">NSX Roadshow<\/a><\/p>\n<ul>\n<li>October 13, 2016<\/li>\n<li>Cincinnati, Ohio<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/204592\" target=\"_blank\">Technical Prevention Update<\/a><\/p>\n<ul>\n<li>October 13, 2016<\/li>\n<li>New York, New York<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/193908\" target=\"_blank\">EBC Com Palo Alto Networks: Outuburo 13-14<\/a><\/p>\n<ul>\n<li>October 13 -14, 2016<\/li>\n<li>Santa Clara, California<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/196367\" target=\"_blank\">Live Webinar: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>October 18, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201191\" target=\"_blank\">Ultimate Test Drive \u2013 Advanced Endpoint Protection (TRAPS)<\/a><\/p>\n<ul>\n<li>October 18, 2016<\/li>\n<li>Issy les Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/194152\" target=\"_blank\">Live Demo: Preventing Security Breaches on the Endpoint<\/a><\/p>\n<ul>\n<li>October 19, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/195980\" target=\"_blank\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>October 19, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/202956\" target=\"_blank\">UTD Advanced Endpoint Protection Oregon<\/a><\/p>\n<ul>\n<li>October 19. 2016<\/li>\n<li>Beaverton, Oregon<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/188301\" target=\"_blank\">Advanced Endpoint prevention, live demo<\/a><\/p>\n<ul>\n<li>October 20, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/infosecuritynl\" target=\"_blank\">Infosecurity Netherlands<\/a><\/p>\n<ul>\n<li>November 2-3, 2016<\/li>\n<li>Utrecht, Netherlands<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here. Unit 42 shared new research about EITest, a long-running campaign that &hellip;<\/p>\n","protected":false},"author":153,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[447,251,432,403,1819,2142,191,102,586,2757],"coauthors":[1515],"class_list":["post-20823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","category-news-of-the-week","tag-australia","tag-cybersecurity-canon","tag-emea","tag-events-2","tag-ignite","tag-labyrenth","tag-mark-mclaughlin","tag-remote-access","tag-unit-42","tag-wildfire-eu-cloud"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/20823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=20823"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/20823\/revisions"}],"predecessor-version":[{"id":20832,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/20823\/revisions\/20832"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=20823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=20823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=20823"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=20823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}