{"id":23777,"date":"2017-02-04T04:00:39","date_gmt":"2017-02-04T12:00:39","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=23777"},"modified":"2017-02-03T09:39:51","modified_gmt":"2017-02-03T17:39:51","slug":"palo-alto-networks-news-week-february-4-2017","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/02\/palo-alto-networks-news-week-february-4-2017\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 February 4, 2017"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up our top news right here:<\/p>\n<ul>\n<li>Unit 42 shared <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/01\/unit42-threat-brief-shamoon-2-wave-3-attacks\/\">updates on Shamoon 2<\/a> in the latest Threat Brief.<\/li>\n<li>Did you miss any of our cybersecurity predictions for 2017? Check out <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/01\/2017-cybersecurity-predictions-sure-things-long-shots\/\">sure things and long shots for 2017<\/a>.<\/li>\n<li>Unit 42 investigated the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/01\/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments\/\">Downeks and Quasar RAT<\/a> methods used in recent targeted attacks against governments. Read the full report.<\/li>\n<li>Is your <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/02\/security-team-ready-cloud\/\">security team ready for the cloud<\/a>? Frank Mong shared his thoughts.<\/li>\n<li>When it comes to exploit kits, you need to protect yourself before you wreck yourself. <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/02\/exploit-kits-protect-wreck\/\">Discover how Traps advanced endpoint protection<\/a> can keep your organization safe from these types of attacks.<\/li>\n<li>Connect with other local Palo Alto Networks users. Check out upcoming <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/02\/connect-locally-with-palo-alto-networks-users-at-upcoming-spark-user-summits\/\">Spark User Summits<\/a> in your area.<\/li>\n<\/ul>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p>Join us live on February 7, 2017 for Security\u2019s Colossal Event! <a href=\"http:\/\/go.paloaltonetworks.com\/cyberseccolossalevent\">Register today<\/a>.<\/p>\n<p><a href=\"https:\/\/get.info.paloaltonetworks.com\/webApp\/cloud-security-event-en?CampaignId=70170000001Y4gvAAC&amp;referer=null&amp;utm_medium=social-owned-promo&amp;utm_source=social+media\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:46.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-23384 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/01\/rome-blog-500x233-1.jpeg\" alt=\"rome-blog-500x233\" width=\"500\" height=\"233\" \/><\/span><\/div><\/a><\/p>\n<p>Are you attending RSA? Register for the Palo Alto Networks <a href=\"https:\/\/www.regonline.com\/registration\/Checkin.aspx?EventID=1931357\" rel=\"nofollow,noopener\" >exclusive after party<\/a>!<\/p>\n<p><a href=\"https:\/\/www.regonline.com\/registration\/Checkin.aspx?EventID=1931357\" rel=\"nofollow,noopener\" ><div style=\"max-width:100%\" data-width=\"440\"><span class=\"ar-custom\" style=\"padding-bottom:50%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-23582 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/01\/PAN_RSA17_AfterParty_Twitter.jpg\" alt=\"pan_rsa17_afterparty_twitter\" width=\"440\" height=\"220\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/225025\">How to stand out from the crowd and make more money with Palo Alto Networks?<\/a><\/p>\n<ul>\n<li>February 15, 2017<\/li>\n<li>London, UK<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/224542\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>February 15, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/215286\">Securely Enable a Hybrid Cloud with AW<\/a><\/p>\n<ul>\n<li>February 15, 2017<\/li>\n<li>Stockholm, Sweden<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/188312\">Advanced Endpoint Protection, Live Demo <\/a><\/p>\n<ul>\n<li>February 16, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sit back, relax and enjoy the top Palo Alto Networks news of the week.<\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[109,3185,403,1679,1075,3116,3125,778,586],"coauthors":[1515],"class_list":["post-23777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-cloud","tag-downeks-and-quasar-rat","tag-events-2","tag-exploit-kits","tag-fuel-user-group-2","tag-shamoon-2","tag-threat-brief","tag-traps","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/23777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=23777"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/23777\/revisions"}],"predecessor-version":[{"id":23783,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/23777\/revisions\/23783"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=23777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=23777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=23777"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=23777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}