{"id":21396,"date":"2016-10-29T04:00:43","date_gmt":"2016-10-29T11:00:43","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=21396"},"modified":"2016-10-28T12:32:20","modified_gmt":"2016-10-28T19:32:20","slug":"palo-alto-networks-news-week-october-29-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/10\/palo-alto-networks-news-week-october-29-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 October 29, 2016"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here.<\/p>\n<ul>\n<li>Lawrence Chin explained why ATMs need <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/atms-need-better-protection-malware\/\" target=\"_blank\">better protection from Malware<\/a>.<\/li>\n<li>Mihoko Matsubara took a look into how Japanese businesses are <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/cso-japanese-businesses-cultivating-cybersecurity-professionals\/\" target=\"_blank\">cultivating cybersecurity professionals<\/a>.<\/li>\n<li>Houdini made a magic reappearance. Unit 42 researchers observed a new version <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/unit42-houdinis-magic-reappearance\/\" target=\"_blank\">of Hworm (or Houdini) being used within multiple attacks<\/a>.<\/li>\n<li>Don\u2019t let your users be a weak link in security. Our latest Cybersecurity Download explained how to <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/cybersecurity-download-user-based-access-controls\/\" target=\"_blank\">make the most of your next-generation firewall<\/a>.<\/li>\n<li>Cybersecurity Canon guest contributor Nicola Burr reviewed <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/cybersecurity-canon-psychology-information-security\/\" target=\"_blank\"><em>The Psychology of Information Security: Resolving conflicts between security compliance and human behavior<\/em><\/a>.<\/li>\n<li>Join us in Vancouver June 12-15, 2017 for Ignite 2017. <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/09\/ignite-2017-want-to-get-100-off-any-palo-alto-networks-exam\/\">Register today<\/a> and enjoy a 100 percent discount on a Palo Alto Networks exam of your choice!<\/li>\n<\/ul>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our new <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\" target=\"_blank\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/209570\" target=\"_blank\">Ultimate Test Drive GTA: Advanced Endpoint<\/a><\/p>\n<ul>\n<li>November 1, 2016<\/li>\n<li>Mississagua, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207930\" target=\"_blank\">Live Demo: Preventing Security Breaches on the Endpoint <\/a><\/p>\n<ul>\n<li>November 2, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/infosecuritynl\" target=\"_blank\">Infosecurity Netherlands<\/a><\/p>\n<ul>\n<li>November 2-3, 2016<\/li>\n<li>Utrecht, Netherlands<\/li>\n<\/ul>\n<p><a href=\"http:\/\/bit.ly\/2ecOA7F\" rel=\"nofollow,noopener\"  target=\"_blank\">Cybersecurity Summit \u2013 Jakarta<\/a><\/p>\n<ul>\n<li>November 3, 2016<\/li>\n<li>Jakarta, Indonesia<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207115\" target=\"_blank\">Virtual Ultimate Test Drive NGFW<\/a><\/p>\n<ul>\n<li>November 7, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201184\" target=\"_blank\">Ultimate Test Drive \u2013 Migration Process<\/a><\/p>\n<ul>\n<li>November 8, 2016<\/li>\n<li>Issy les Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/204827\" target=\"_blank\">Higher Education Security Workshop<\/a><\/p>\n<ul>\n<li>November 9, 2016<\/li>\n<li>London, United Kingdom<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207289\" target=\"_blank\">Virtual Ultimate Test Drive TP<\/a><\/p>\n<ul>\n<li>November 9, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/209081\" target=\"_blank\">Next-gen Security for k-12<\/a><\/p>\n<ul>\n<li>November 9, 2016<\/li>\n<li>Spring, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/connect.awswebcasts.com\/paloaltonetworksnovember2016\/event\/registration.html?campaign-id=PT_TW\" rel=\"nofollow,noopener\"  target=\"_blank\">Protection for Security &amp; Compliance<\/a><\/p>\n<ul>\n<li>November 15, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here. Lawrence Chin explained why ATMs need better protection from Malware. Mihoko &hellip;<\/p>\n","protected":false},"author":153,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[2913,251,403,2886,1819,473,2097,145,2916,586],"coauthors":[1515],"class_list":["post-21396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-atms","tag-cybersecurity-canon","tag-events-2","tag-houdini","tag-ignite","tag-japan","tag-mihoko-matsubara","tag-next-generation-firewall","tag-nicola-burr","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=21396"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21396\/revisions"}],"predecessor-version":[{"id":21402,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21396\/revisions\/21402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=21396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=21396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=21396"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=21396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}