{"id":22321,"date":"2016-12-10T04:00:46","date_gmt":"2016-12-10T12:00:46","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=22321"},"modified":"2016-12-09T10:24:49","modified_gmt":"2016-12-09T18:24:49","slug":"palo-alto-networks-news-week-december-10-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/12\/palo-alto-networks-news-week-december-10-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 December 10, 2016"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here.<\/p>\n<ul>\n<li>Our Cybersecurity Predictions series continued with sure things and long shots for cybersecurity in 2017. This week\u2019s predictions include:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/2017-cybersecurity-predictions-ransomware-saas-challenges-persist-healthcare\/\" target=\"_blank\">Ransomware and SaaS Chanllenges Persist in Healthcare<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/2017-cybersecurity-predictions-financial-sector-attackers-exploit-cracks-blockchain-technology\/\" target=\"_blank\">Financial Sector Attackers Exploit Cracks in Blockchain Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/2017-cybersecurity-predictions-preparation-proliferation-personnel-protection-bumper-year-emea\/\">Preparation, Proliferation, Personnel and Protection = A Bumper Year in EMEA<\/a><\/li>\n<\/ul>\n<\/li>\n<li>We announced that <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/partner-traps-earns-crn-product-year-award-endpoint-security\/\" target=\"_blank\">Palo Alto Networks Traps advanced endpoint protection earned CRN\u2019s Product of the Year Award for the Endpoint Security<\/a> category.<\/li>\n<li>Japan CSO Mihoko Matsubara <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/cso-cyber3-conference-actionable-takeaways-global-thought-leaders\/\">shared actionable takeaways for global thought leaders in her Cyber3 conference recap<\/a>.<\/li>\n<li>Can you <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/3-fundamentals-secure-cloud-adoption\/\" target=\"_blank\">answer these three questions<\/a>? If you can\u2019t, you may not be ready for cloud.<\/li>\n<li>License to explore: <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/license-explore-access-new-virtual-test-lab-fuel-user-group\/\" target=\"_blank\">gain access to the new Virtual Test Lab with Fuel User Group<\/a>.<\/li>\n<li>Unit 42 shared new, updated research <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/unit42-samsa-ransomware-attacks-year-review\/\" target=\"_blank\">into SamSa ransomware and its financial impact<\/a>.<\/li>\n<\/ul>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our new <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\" target=\"_blank\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/193070\" target=\"_blank\">Securing your Microsoft Environment: From the Network to the Cloud to the Endpoint<\/a><\/p>\n<ul>\n<li>December 13, 2016<\/li>\n<li>San Diego, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207934\" target=\"_blank\">Live Demo: Preventing Breaches on the Endpoint<\/a><\/p>\n<ul>\n<li>December 14, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/211660\" target=\"_blank\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>December 14, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/211660\" target=\"_blank\">Autofocus Event for SOC Leaders in London<\/a><\/p>\n<ul>\n<li>December 14, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/217038\" target=\"_blank\">Securing your Microsoft Environment: From the Network to the Cloud to the Endpoint<\/a><\/p>\n<ul>\n<li>December 14, 2016<\/li>\n<li>Denver, CO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/217043\" target=\"_blank\">Securing your Microsoft Environment: From the Network to the Cloud to the Endpoint<\/a><\/p>\n<ul>\n<li>December 14, 2016<\/li>\n<li>St Louis, MO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/188307\" target=\"_blank\">Advanced Endpoint Protection, Live Demo<\/a><\/p>\n<ul>\n<li>December 15, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/217050\" target=\"_blank\">Securing your Microsoft Environment: From the Network to the Cloud to the Endpoint<\/a><\/p>\n<ul>\n<li>December 15, 2016<\/li>\n<li>Chicago, IL<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/217053\" target=\"_blank\">Securing your Microsoft Environment: From the Network to the Cloud to the Endpoint<\/a><\/p>\n<ul>\n<li>December 15, 2016<\/li>\n<li>New York, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/218619\" target=\"_blank\">Die Zwei um Zwolf: Aperture <\/a><\/p>\n<ul>\n<li>December 16, 2016<\/li>\n<li>Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here. Our Cybersecurity Predictions series continued with sure things and long shots &hellip;<\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[109,218,403,3065,778,586,2922],"coauthors":[1515],"class_list":["post-22321","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-cloud","tag-crn","tag-events-2","tag-japan-mihoko-matsubara","tag-traps","tag-unit-42","tag-women-in-tech"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=22321"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22321\/revisions"}],"predecessor-version":[{"id":22325,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22321\/revisions\/22325"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=22321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=22321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=22321"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=22321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}