{"id":22193,"date":"2016-12-03T04:00:07","date_gmt":"2016-12-03T12:00:07","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=22193"},"modified":"2016-12-02T13:36:55","modified_gmt":"2016-12-02T21:36:55","slug":"palo-alto-networks-news-week-december-3-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/12\/palo-alto-networks-news-week-december-3-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 December 3, 2016"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here.<\/p>\n<ul>\n<li>This week we kicked off our Cybersecurity Predictions series detailing sure things and long shots for cybersecurity in 2017. This week\u2019s predictions include:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/2017-cybersecurity-predictions-new-norms-expected-threat-landscape\/\" target=\"_blank\">New Norms Expected in Threat Landscape<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/2017-cybersecurity-predictions-year-get-serious-iot-security\/\" target=\"_blank\">The Year We Get Serious About IoT Security<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/2017-cybersecurity-predictions-iot-security-flaws-awareness-will-magnified\/\" target=\"_blank\">IoT Security Flaws Awareness Will Be Magnified <\/a><\/li>\n<\/ul>\n<\/li>\n<li>We took a look at why <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/automation-key-effective-saas-security\/\" target=\"_blank\">automation is key for effective SaaS security<\/a>.<\/li>\n<li>Unit 42 investigated <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/unit42-pluginphantom-new-android-trojan-abuses-droidplugin-framework\/\" target=\"_blank\">PluginPhantom: New Android Trojan that abuses the \u201cDroidPlugin\u201d framework<\/a>.<\/li>\n<li>Unit 42 also published technical details on <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/11\/unit42-shamoon-2-return-disttrack-wiper\/\" target=\"_blank\">Shamoon 2: Return of the Disttrack Wiper<\/a>.<\/li>\n<li>What are unknown <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/unknown-cyber-threats-really-unknown\/\" target=\"_blank\">cyber threats, and are they really unknown<\/a>? Discover how real-time automation can make the unknown known.<\/li>\n<li>Japan CSO Mihoko Matsubara <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/cso-japans-cybersecurity-field-needs-you\/\" target=\"_blank\">challenges women in tech worldwide<\/a> to embrace opportunities in cybersecurity.<\/li>\n<li>Steve Winterfeld reviewed \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/cybersecurity-canon-measure-anything-cybersecurity-risk\/\" target=\"_blank\">How to Measure Anything in Cybersecurity Risk<\/a>\u201d for the Cybersecurity Canon.<\/li>\n<\/ul>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our new <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\" target=\"_blank\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207953\" target=\"_blank\">Live Webinar: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>December 6, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/214062\" target=\"_blank\">Cloud Security Workshop<\/a><\/p>\n<ul>\n<li>December 6, 2016<\/li>\n<li>Culver City, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201329\" target=\"_blank\">NSX Roadshow<\/a><\/p>\n<ul>\n<li>December 7, 2016<\/li>\n<li>New York, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/211659\" target=\"_blank\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>December 7, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/campaigns\/brighttalk.html?CampaignId=70170000001Y1ZpAAK&amp;commid=234311&amp;referer=null&amp;utm_medium=social-owned-promo&amp;utm_source=Social+Media\" target=\"_blank\">Exploit kits: getting in by any means necessary <\/a><\/p>\n<ul>\n<li>December 7, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201196\" target=\"_blank\">Ultimate Test Drive \u2013 Advanced Endpoint Protection <\/a><\/p>\n<ul>\n<li>December 8, 2016<\/li>\n<li>Issy les Moulineaux, France<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here. This week we kicked off our Cybersecurity Predictions series detailing sure &hellip;<\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[3055,251,3029,149,3041,586,2922],"coauthors":[1515],"class_list":["post-22193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-cyber-threats","tag-cybersecurity-canon","tag-pluginphantom","tag-saas","tag-shamoon","tag-unit-42","tag-women-in-tech"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=22193"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22193\/revisions"}],"predecessor-version":[{"id":22197,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22193\/revisions\/22197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=22193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=22193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=22193"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=22193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}