{"id":21903,"date":"2016-11-19T04:00:51","date_gmt":"2016-11-19T12:00:51","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=21903"},"modified":"2016-11-18T10:56:30","modified_gmt":"2016-11-18T18:56:30","slug":"palo-alto-networks-news-week-november-19-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/11\/palo-alto-networks-news-week-november-19-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 November 19, 2016"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here.<\/p>\n<ul>\n<li>Tim Treat and Nate Bitting shared three blog posts to help your organization get ready for threat prevention.\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/palo-alto-networks-setting-expectations-prevention-readiness\/\" target=\"_blank\">How Palo Alto Networks is Setting Expectations for Prevention Readiness<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/setting-expectations-prevention-readiness-prevention-posture-assessment\/\" target=\"_blank\">Setting Expectations for Prevention Readiness: The Prevention-Posture Assessment<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/setting-expectations-prevention-readiness-measuring-prevention-capabilities\/\" target=\"_blank\">Setting Expectations for Prevention Readiness: Measuring Prevention capabilities<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Mark McLaughlin blogged about the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/gov-palo-alto-networks-honored-to-receive-vets-in-tech-education-award\/\" target=\"_blank\">\u201cEducation Award\u201d that Palo Alto Networks received from Vets in Tech<\/a> for their commitment to advancing educational opportunities for veterans.<\/li>\n<li>Unit 42 shared their <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/unit42-exploit-kits-exposed-automated-attacks-scale\/\" target=\"_blank\">latest research on Exploit Kits<\/a> with details about the ecosystem behind these attacks and how to prevent them.<\/li>\n<li>Are we as cyber-ready as we think? Pamela Warren shared how <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/gov-cyber-ready-think-heres-22-nations-militaries-testing-readiness\/\" target=\"_blank\">twenty-two nations\u2019 militaries are testing readiness<\/a>.<\/li>\n<li>Navneet Singh explains <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/prevent-cyberattacks-securing-remote-access-tools\/\" target=\"_blank\">how you can prevent cyberattacks<\/a> by securing the remote access tools on your network.<\/li>\n<li>Linda Cureton reviewed <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/cybersecurity-canon-gods-remarkable-story-risk\/\" target=\"_blank\">\u201cAgainst the Gods: The Remarkable Story of Risk\u201d<\/a> for the Cybersecurity Canon.<\/li>\n<li>Good news! <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/ignite-2017-call-papers-deadline-extended\/\" target=\"_blank\">The Call for Papers deadline for Ignite 2017<\/a> has been extended to January 6, 2016.<\/li>\n<\/ul>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our new <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\" target=\"_blank\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/193632\" target=\"_blank\">Live-Demo fur einen erweiterten Endpunkt-shutz<\/a><\/p>\n<ul>\n<li>November 22, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207951\" target=\"_blank\">Live Webinar: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>November 22, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/211657\" target=\"_blank\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>November 23, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201200\" target=\"_blank\">Ultimate Test Drive \u2013 Next Generation Firewall<\/a><\/p>\n<ul>\n<li>November 24, 2016<\/li>\n<li>Issy les Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/193196\" target=\"_blank\">Autofocus Event for SOC Leaders<\/a><\/p>\n<ul>\n<li>November 29, 2016<\/li>\n<li>Amsterdam, The Netherlands<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/campaigns\/brighttalk.html?CampaignId=70170000001Y1ZfAAK&amp;commid=234825&amp;referer=null&amp;utm_medium=social-owned-promo&amp;utm_source=Social+Media\" target=\"_blank\">SilverTerrier: That Nigerian Prince Has Evolved His Game<\/a><\/p>\n<ul>\n<li>November 30, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/campaigns\/brighttalk.html?CampaignId=70170000001Y1ZpAAK&amp;commid=234311&amp;referer=null&amp;utm_medium=social-owned-promo&amp;utm_source=Social+Media\" target=\"_blank\">Exploit kits: getting in by any means necessary <\/a><\/p>\n<ul>\n<li>December 7, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here. Tim Treat and Nate Bitting shared three blog posts to help &hellip;<\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[251,403,1679,123,1819,1057,102,586,2976],"coauthors":[1515],"class_list":["post-21903","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-cybersecurity-canon","tag-events-2","tag-exploit-kits","tag-government2","tag-ignite","tag-prevention","tag-remote-access","tag-unit-42","tag-vets-in-tech"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=21903"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21903\/revisions"}],"predecessor-version":[{"id":21906,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21903\/revisions\/21906"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=21903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=21903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=21903"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=21903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}