{"id":23408,"date":"2017-01-21T04:00:18","date_gmt":"2017-01-21T12:00:18","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=23408"},"modified":"2017-01-20T10:14:29","modified_gmt":"2017-01-20T18:14:29","slug":"palo-alto-networks-news-week-january-21-2017","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/01\/palo-alto-networks-news-week-january-21-2017\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 January 21, 2017"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up our top news and views right here:<\/p>\n<ul>\n<li>The <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/01\/unit42-second-wave-shamoon-2-attacks-reveal-possible-new-tactic\/\">second wave of Shamoon 2 attacks<\/a> reveal a possible new tactic. Get more details in Unit 42\u2019s Threat Brief.<\/li>\n<li>Stephanie Johnson shared five things to consider when <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/01\/5-key-considerations-implementing-user-based-access-controls\/\">implementing user-based access controls<\/a>.<\/li>\n<li>Customer Spotlight: <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/01\/customer-spotlight-law-firm-thwarts-ransomware-traps-advanced-endpoint-protection\/\">Law firm P\u00e9rez-Llorca thwarts ransomware with Traps advanced endpoint protection<\/a>.<\/li>\n<\/ul>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p>Join us live on February 7, 2017 for the Security\u2019s Colossal Event! <a href=\"http:\/\/go.paloaltonetworks.com\/cyberseccolossalevent\">Register today<\/a>.<\/p>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/cyberseccolossalevent\"><div style=\"max-width:100%\" data-width=\"1200\"><span class=\"ar-custom\" style=\"padding-bottom:52.5%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-23402 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/01\/rome-facebook-1200x630.jpeg\" alt=\"rome-facebook-1200x630\" width=\"1200\" height=\"630\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Join us for <a href=\"http:\/\/go.paloaltonetworks.com\/bpwfy17q2nam\">Breach Prevention Week<\/a>! Monday January 23 \u2013 Friday January 24<\/p>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/bpwfy17q2nam\"><div style=\"max-width:100%\" data-width=\"1135\"><span class=\"ar-custom\" style=\"padding-bottom:31.45%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-23411 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/01\/breach-banner_January_17.jpg\" alt=\"breach-banner_january_17\" width=\"1135\" height=\"357\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207957\">Live Webinar: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>January 24, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/215288\">Securely Enable a Hyrbid Cloud with AWS<\/a><\/p>\n<ul>\n<li>January 24, 2017<\/li>\n<li>Houten, Netherlands<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/224107\">Rejoignez Les \u00c9quipes Palo Alto Networks<\/a><\/p>\n<ul>\n<li>January 24, 2017<\/li>\n<li>Lille, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/211667\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>January 25, 2017<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/211667\">Ransomware Lunch n\u2019 Learn<\/a><\/p>\n<ul>\n<li>January 25, 2017<\/li>\n<li>Santa Monica, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/219749\">Ultimate Test Drive \u2013 Advanced Endpoint Protection<\/a><\/p>\n<ul>\n<li>January 25, 2017<\/li>\n<li>Budapest, Hungary<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/218185\">Autofocus event for SOC leaders \u2013 MSSP<\/a><\/p>\n<ul>\n<li>January 26, 2017<\/li>\n<li>Amsterdam, Netherlands<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/222543\">Unlock the Mystery Behind Ransomware<\/a><\/p>\n<ul>\n<li>January 26, 2017<\/li>\n<li>EL Segundo, CA<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up our top news and views right here: The second wave of Shamoon 2 attacks reveal a &hellip;<\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[1272,1822,403,3128,3116,586,412],"coauthors":[1515],"class_list":["post-23408","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-breach-prevention-week","tag-customer-spotlight","tag-events-2","tag-perez-llorca","tag-shamoon-2","tag-unit-42","tag-user-id"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/23408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=23408"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/23408\/revisions"}],"predecessor-version":[{"id":23423,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/23408\/revisions\/23423"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=23408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=23408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=23408"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=23408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}