{"id":26016,"date":"2017-04-01T04:00:23","date_gmt":"2017-04-01T11:00:23","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=26016"},"modified":"2017-03-31T10:41:42","modified_gmt":"2017-03-31T17:41:42","slug":"palo-alto-networks-news-week-april-1-2017","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/04\/palo-alto-networks-news-week-april-1-2017\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 April 1, 2017"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry -- we\u2019ve rounded up our top news and views right here:<\/p>\n<ul>\n<li>Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/palo-alto-networks-next-generation-firewall-wins-sans-best-2016-award\/\">Next-generation Firewall wins SANS best of 2016 award<\/a>.<\/li>\n<li>The Unit 42 Threat Intelligence team shared new research:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/unit42-shamoon-2-delivering-disttrack\/\">Shamoon 2: Delivering Disttrack<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/unit42-threat-brief-credential-theft-keystone-shamoon-2-attacks\/\">Threat Brief: Credential Theft \u2013 The Keystone of the Shamoon 2 Attacks<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/unit42-dimnie-hiding-plain-sight\/\">Dimnie: Hiding in Plain Sight<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/unit42-trochilus-rat-new-moonwind-rat-used-attack-thai-utility-organizations\/\">Trochilus and New MoonWind RATs Used in Attack Against Thai Organizations<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Pamela Warren reflects back on her \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/securing-networks-women-cyber\/\">Women in Cyber<\/a>\u201d panel at the Cyber Defense and Network Security (CDANS) conference.<\/li>\n<li>In this edition of the NextWave Huddle Recap, Ron Myers shared <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/partner-nextwave-huddle-recap-3-keys-palo-alto-networks-partners-q3-fy17\/\">3 keys for Palo Alto Networks Partners in Q3 FY17<\/a>.<\/li>\n<li>Terry Young explained how Mobile Network Operators can boost value for their customers by <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/mobile-network-operators-boost-value-safest-network\/\">providing the \u2018safest\u2019 network<\/a>.<\/li>\n<li>Are you attending this weekend\u2019s Women in Cyber Conference in Tucson? Be sure to catch our very own Rinki Sethi\u2019s session, \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/see-you-at-wicys-2017\/\">The Power of Perseverance: Embrace the Discomfort<\/a>\u201d today at 10:45 AM PT.<\/li>\n<\/ul>\n<p>Have you registered for <a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\">Palo Alto Networks Ignite '17 Security Conference<\/a>? Join over 4,000 security professionals in Vancouver for the most exciting cybersecurity conference of the year! Grab your seat at one of our many <a href=\"https:\/\/ignite.paloaltonetworks.com\/forms\/regform.html?referer=null&amp;utm_medium=social-owned-promo&amp;utm_source=Social+Media\">hands-on sessions<\/a> and take your cybersecurity skills to the next level!<\/p>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\"><div style=\"max-width:100%\" data-width=\"820\"><span class=\"ar-custom\" style=\"padding-bottom:41.46%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-25356 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/03\/ignite17-social-cover-img-facebook-820x340.png\" alt=\"ignite17-social-cover-img-facebook-820x340\" width=\"820\" height=\"340\" \/><\/span><\/div><\/a><\/p>\n<p>Take a look at <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/237905\">SECURITY\u2019S COLOSSAL EVENT \u2013 MYANMAR<\/a><\/p>\n<ul>\n<li>April 5, 2017<\/li>\n<li>Yangon, Myanmar<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/233402\">Cybersecurity Summit - Kuala Lumpur<\/a><\/p>\n<ul>\n<li>April 5, 2017<\/li>\n<li>Kuala Lumpur, Malaysia<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/224667\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>April 5, 2017<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/233676\">Virtual Ultimate Test Drive NGFW<\/a><\/p>\n<ul>\n<li>April 10, 2017<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/237107\">PAN-OS 8.0 UPDATE<\/a><\/p>\n<ul>\n<li>April 11, 2017<\/li>\n<li>Las Vegas, NV<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/241250\">Live Demo: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>April 11, 2017<\/li>\n<li>Online Event<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Catch all the top Palo Alto Networks news of the week all in one place. <\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[3342,3483,145,3288,3489,937,586,3459],"coauthors":[1515],"class_list":["post-26016","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-cdans","tag-mno","tag-next-generation-firewall","tag-nextwave-partner","tag-sans","tag-service-provider","tag-unit-42","tag-women-in-cyber"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=26016"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26016\/revisions"}],"predecessor-version":[{"id":26025,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26016\/revisions\/26025"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=26016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=26016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=26016"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=26016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}