{"id":21030,"date":"2016-10-15T04:00:18","date_gmt":"2016-10-15T11:00:18","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=21030"},"modified":"2016-10-14T14:23:14","modified_gmt":"2016-10-14T21:23:14","slug":"palo-alto-networks-news-week-october-15-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/10\/palo-alto-networks-news-week-october-15-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 October 15, 2016"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here.<\/p>\n<ul>\n<li>Awesome Jerry returned to explain common threats in SaaS applications, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/awesome-jerry-explains-common-threats-saas-malicious-data-exfiltration\/\" target=\"_blank\">including Malicious Data Exfiltration. <\/a><\/li>\n<li>Did you get a chance to visit us at Singapore International Cyber Week 2016? <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/visit-palo-alto-networks-singapore-international-cyber-week-2016\/\" target=\"_blank\">Learn more about this year\u2019s event. <\/a><\/li>\n<li>Danielle Kriz elaborated on Poland\u2019s expanded leadership role on Cybersecurity and <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/gov-poland-expands-leadership-role-on-cybersecurity\/\" target=\"_blank\">other key takeaways from this year\u2019s CYBERSEC EU conference<\/a>.<\/li>\n<li>The wait is over! Traps 3.4.1 is available for download from the support site. <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/tech-docs-traps-3-4-1-documentation-now-available\/\" target=\"_blank\">Get the latest technical documentation.<\/a><\/li>\n<li>Election season presents unique opportunities for cybercriminals. Stephanie Johnson shared <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/cybersecurity-and-election-time-how-to-avoid-being-a-victim\/\" target=\"_blank\">five ways to protect valuable data and avoid becoming a victim<\/a>.<\/li>\n<li>Rick Howard showed us how to <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/cso-awkward-conversations-cybersecurity-avoid\/\" target=\"_blank\">avoid having an awkward conversation<\/a> when talking about cybersecurirty.<\/li>\n<li>General John A. Davis gives <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/cso-palo-alto-networks-joins-government-industry-leaders-washington-post-cybersecurity-summit\/\" target=\"_blank\">his recap of this year\u2019s Washington Post Cybersecurity Summit<\/a>.<\/li>\n<li>Jon Oltsik reviewed \u201cThere Will Be Cyberwar\u201d by Richard Stiennon for the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/cybersecurity-canon-will-cyberwar\/\" target=\"_blank\">Cybersecurity Canon<\/a>.<\/li>\n<li>Join us in Vancouver June 12-15 for Ignite 2017. <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/09\/ignite-2017-want-to-get-100-off-any-palo-alto-networks-exam\/\" target=\"_blank\">Register today<\/a> and enjoy a 100 percent discount on a Palo Alto Networks exam of your choice!<\/li>\n<\/ul>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our new <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\" target=\"_blank\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/196367\" target=\"_blank\">Live Webinar: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>October 18, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201191\" target=\"_blank\">Ultimate Test Drive \u2013 Advanced Endpoint Protection (TRAPS)<\/a><\/p>\n<ul>\n<li>October 18, 2016<\/li>\n<li>Issy les Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/194152\" target=\"_blank\">Live Demo: Preventing Security Breaches on the Endpoint<\/a><\/p>\n<ul>\n<li>October 19, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/195980\" target=\"_blank\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>October 19, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/202956\" target=\"_blank\">UTD Advanced Endpoint Protection Oregon<\/a><\/p>\n<ul>\n<li>October 19, 2016<\/li>\n<li>Beaverton, Oregon<\/li>\n<\/ul>\n<p><u><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/188301\" target=\"_blank\">Advanced Endpoint prevention, live demo<\/a><\/u><\/p>\n<ul>\n<li>October 20, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/199767\" target=\"_blank\">AT&amp;T Cybersecurity Conference Happy Hour<\/a><\/p>\n<ul>\n<li>October 24, 2016<\/li>\n<li>New York, New York<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/200386\" target=\"_blank\">Preventing Ransomware in Healthcare<\/a><\/p>\n<ul>\n<li>October 26, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/190747\" target=\"_blank\">Advanced Endpoint Protection: A Palo Alto Networks Ultimate Test Drive Event<\/a><\/p>\n<ul>\n<li>October 26, 2016<\/li>\n<li>Toronto, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/193195\" target=\"_blank\">Autofocus Event for SOC Leaders<\/a><\/p>\n<ul>\n<li>October 26, 2016<\/li>\n<li>Amsterdam, the Netherlands<\/li>\n<\/ul>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/infosecuritynl\" target=\"_blank\">Infosecurity Netherlands<\/a><\/p>\n<ul>\n<li>November 2-3, 2016<\/li>\n<li>Utrecht, Netherlands<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here. Awesome Jerry returned to explain common threats in SaaS applications, including &hellip;<\/p>\n","protected":false},"author":153,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[2320,251,2715,123,1819,2799,345,2760,778,2790],"coauthors":[1515],"class_list":["post-21030","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-awesome-jerry","tag-cybersecurity-canon","tag-danielle-kriz","tag-government2","tag-ignite","tag-john-a-davis","tag-rick-howard","tag-sicw","tag-traps","tag-washington-post"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=21030"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21030\/revisions"}],"predecessor-version":[{"id":21033,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21030\/revisions\/21033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=21030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=21030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=21030"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=21030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}