{"id":21702,"date":"2016-11-12T04:00:04","date_gmt":"2016-11-12T12:00:04","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=21702"},"modified":"2016-11-11T11:33:51","modified_gmt":"2016-11-11T19:33:51","slug":"palo-alto-networks-news-week-november-12-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/11\/palo-alto-networks-news-week-november-12-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 November 12, 2016"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here.<\/p>\n<ul>\n<li>Ron Myers shared how <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/partner-how-palo-alto-networks-is-building-next-generation-security-innovators\/\" target=\"_blank\">Palo Alto Networks is building next-generation security innovators<\/a>.<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/cso-madam-mr-president-heres-keep-pedal-cyber-metal\/\" target=\"_blank\">John Davis shared his cybersecurity recommendations<\/a> to the incoming administration.<\/li>\n<li>AV-Comparatives presented <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/av-comparatives-presents-traps-approved-award\/\" target=\"_blank\">Palo Alto Networks Traps advanced endpoint protection with its \u201cApproved\u201d award<\/a>.<\/li>\n<li>Navneet Singh explained how to <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/unrestricted-access-office-365-risky-heres-enable-safely\/\" target=\"_blank\">safely enable Office 365<\/a>.<\/li>\n<li>Eila Shargh shared <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/ransomware-common-attack-methods\/\" target=\"_blank\">common ransomware attack methods<\/a> that you should be aware of.<\/li>\n<li>Christina Ayiotis reviewed <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/cybersecurity-canon-cyberspace-state-toward-strategy-cyber-power\/\" target=\"_blank\"><em>Cyberspace and the State: Toward a Strategy for Cyber-power<\/em><\/a> for the Cybersecurity Canon.<\/li>\n<li>Greg Day <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/cso-the-proof-is-in-the-eating\/\" target=\"_blank\">surveyed customers on our platform approach<\/a> and well, the proof is in the eating.<\/li>\n<li>We announced our new <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/announcing-palo-alto-networks-app-ibm-qradar\/\" target=\"_blank\">application for IBM QRadar<\/a>. Check out the demo below.<\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\"><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"B4ZKSPEjxHo\" ><\/lite-youtube><\/div><\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our new <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\" target=\"_blank\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/210166\" target=\"_blank\">NH \u2013 ISAC Fall Healthcare Summit Welcome Reception<\/a><\/p>\n<ul>\n<li>November 14, 2016<\/li>\n<li>San Diego, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/connect.awswebcasts.com\/paloaltonetworksnovember2016\/event\/registration.html?campaign-id=PT_TW\" rel=\"nofollow,noopener\"  target=\"_blank\">Protection for Security &amp; Compliance<\/a><\/p>\n<ul>\n<li>November 15, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207309\" target=\"_blank\">Virtual Ultimate Test Drive VDC<\/a><\/p>\n<ul>\n<li>November 15, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207310\" target=\"_blank\">Virtual Ultimate Test Drive TP<\/a><\/p>\n<ul>\n<li>November 16, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201327\" target=\"_blank\">NSX Roadshow<\/a><\/p>\n<ul>\n<li>November 16, 2016<\/li>\n<li>Cambridge, MA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207932\" target=\"_blank\">Live Demo: Preventing Security Breaches on the Endpoint<\/a><\/p>\n<ul>\n<li>November 16, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/211654\" target=\"_blank\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>November 16, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/188305\" target=\"_blank\">Advanced Endpoint Protection, Live Demo<\/a><\/p>\n<ul>\n<li>November 17, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207313\" target=\"_blank\">Virtual Ultimate Test Drive MP<\/a><\/p>\n<ul>\n<li>November 17, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207315\" target=\"_blank\">Virtual Ultimate Test Drive AEP<\/a><\/p>\n<ul>\n<li>November 18, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here. Ron Myers shared how Palo Alto Networks is building next-generation security &hellip;<\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[2952,251,2967,432,403,1554,2943,2052,355,2955,1818,216,2946,221,778],"coauthors":[1515],"class_list":["post-21702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-av-comparatives","tag-cybersecurity-canon","tag-election-2016","tag-emea","tag-events-2","tag-greg-day","tag-ibm","tag-john-davis","tag-nextwave","tag-office-365","tag-partners","tag-platform","tag-qradar","tag-ransomware","tag-traps"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=21702"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21702\/revisions"}],"predecessor-version":[{"id":21705,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21702\/revisions\/21705"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=21702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=21702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=21702"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=21702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}