{"id":21537,"date":"2016-11-05T04:00:23","date_gmt":"2016-11-05T11:00:23","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=21537"},"modified":"2016-11-03T17:08:04","modified_gmt":"2016-11-04T00:08:04","slug":"palo-alto-networks-news-week-november-5-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/11\/palo-alto-networks-news-week-november-5-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 November 5, 2016"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here.<\/p>\n<ul>\n<li>Palo Alto Networks celebrated women in Computing at the Anita Borg Institute\u2019s <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/palo-alto-networks-celebrates-women-computing-grace-hopper-celebration-2016\/\" target=\"_blank\">Grace Hopper Celebration 2016<\/a>. Watch the event recap below.<br \/>\n<div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"-cwzNgxZ5X4\" ><\/lite-youtube><\/div><\/li>\n<\/ul>\n<ul>\n<li>Aperture New Features Guide is now camera-ready. Check out the new <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/tech-docs-aperture-new-features-guide-now-camera-ready\/\" target=\"_blank\">Aperture technical documentation<\/a>.<\/li>\n<li>The Nigerian Prince is back and he has upped his game. Get the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/unit42-nigerian-prince-evolved-game\/\" target=\"_blank\">new report from Unit 42<\/a> and watch how Nigerian Cybercrime has evolved in the video below.<br \/>\n<div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"1kZEGUIAi1o\" ><\/lite-youtube><\/div><\/li>\n<\/ul>\n<ul>\n<li>DaMon Ross reviewed <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/cybersecurity-canon-cybersecurity-leadership-powering-modern-organization\/\" target=\"_blank\"><em>Cybersecurity Leadership: Powering the Modern Organization<\/em><\/a> for the Cybersecurity Canon.<\/li>\n<\/ul>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our new <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\" target=\"_blank\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207115\" target=\"_blank\">Virtual Ultimate Test Drive NGFW<\/a><\/p>\n<ul>\n<li>November 7, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201184\" target=\"_blank\">Ultimate Test Drive \u2013 Migration Process<\/a><\/p>\n<ul>\n<li>November 8, 2016<\/li>\n<li>Issy les Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/204827\" target=\"_blank\">Higher Education Security Workshop<\/a><\/p>\n<ul>\n<li>November 9, 2016<\/li>\n<li>London, United Kingdom<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207289\" target=\"_blank\">Virtual Ultimate Test Drive TP<\/a><\/p>\n<ul>\n<li>November 9, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/209081\" target=\"_blank\">Next-gen Security for k-12<\/a><\/p>\n<ul>\n<li>November 9, 2016<\/li>\n<li>Spring, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/191801\" target=\"_blank\">Ultimate Test Drive \u2013 Threat Prevention<\/a><\/p>\n<ul>\n<li>November 10, 2016<\/li>\n<li>Rockville, MD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207300\" target=\"_blank\">Virtual Ultimate Test Drive AEP<\/a><\/p>\n<ul>\n<li>November 11, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/210166\" target=\"_blank\">NH \u2013 ISAC Fall Healthcare Summit Welcome Reception<\/a><\/p>\n<ul>\n<li>November 14, 2016<\/li>\n<li>San Diego, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/connect.awswebcasts.com\/paloaltonetworksnovember2016\/event\/registration.html?campaign-id=PT_TW\" rel=\"nofollow,noopener\"  target=\"_blank\">Protection for Security &amp; Compliance<\/a><\/p>\n<ul>\n<li>November 15, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201327\" target=\"_blank\">NSX Roadshow<\/a><\/p>\n<ul>\n<li>November 16, 2016<\/li>\n<li>Cambridge, MA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207932\" target=\"_blank\">Live Demo: Preventing Security Breaches on the Endpoint<\/a><\/p>\n<ul>\n<li>November 16, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here. Palo Alto Networks celebrated women in Computing at the Anita Borg &hellip;<\/p>\n","protected":false},"author":153,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[1440,403,2877,1819,74,2940,2937,586],"coauthors":[1515],"class_list":["post-21537","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-aperture","tag-events-2","tag-grace-hopper","tag-ignite","tag-malware","tag-nigeria","tag-tech-docs","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=21537"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21537\/revisions"}],"predecessor-version":[{"id":21567,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21537\/revisions\/21567"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=21537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=21537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=21537"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=21537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}