{"id":29130,"date":"2017-05-06T04:00:36","date_gmt":"2017-05-06T11:00:36","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=29130"},"modified":"2017-06-08T11:58:22","modified_gmt":"2017-06-08T18:58:22","slug":"palo-alto-networks-news-week-may-6-2017","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/05\/palo-alto-networks-news-week-may-6-2017\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 May 6, 2017"},"content":{"rendered":"<p>Platform Falcon? Endpoint Turtle? Find out who your Palo Alto Networks Ignite \u201917 guardian is.<\/p>\n<hr \/>\n<div class=\"quizz-container\" data-width=\"100%\" data-iframe-title=\"QUIZ: What Kind of Ignite Guardian Are You?\" data-height=\"auto\" data-quiz=\"385597\"><\/div>\n<p><script src=\"\/\/dcc4iyjchzom0.cloudfront.net\/widget\/loader.js\" async><\/script><\/p>\n<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry \u2013 we\u2019ve rounded up our top news and views right here:<\/p>\n<ul>\n<li>This week we announced Traps v4.0. Check out how we\u2019re <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/traps-40\/\">advancing endpoint security, again<\/a>!<\/li>\n<li>The Unit 42 Threat Intelligence team shared new research:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/unit42-kazuar-multiplatform-espionage-backdoor-api-access\/\">Kazuar: Multiplatform Espionage Backdoor with API Access<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Fred Streefland explained <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/need-actionable-threat-intelligence\/\">why you need actionable threat intelligence<\/a>.<\/li>\n<li>In the first installment of his three-part series, Federal CSO John Davis examined how <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/cso-deterrence-cyberspace-greater-role-industry-part-one-three-part-essay-series\/\">the private sector can aid governments in deterring cybercrime<\/a>.<\/li>\n<li>Scott Shoaf shares how <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/sp-mssp-benefits-small-menu-model-repeatability-next-generation-firewalls\/\">Managed Security Service Providers can benefit from the small menu model<\/a>.<\/li>\n<\/ul>\n<p>Have you registered for <a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\">Palo Alto Networks Ignite \u201817<\/a> Security Conference? Join over 4,000 security professionals in Vancouver for the most exciting cybersecurity conference of the year! Take your cybersecurity skills to the next level at one of our many <a href=\"https:\/\/ignite.paloaltonetworks.com\/forms\/regform.html?referer=null&amp;utm_medium=social-owned-promo&amp;utm_source=Social+Media\">hands-on sessions<\/a>, including the ones below which are filling up quickly:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/04\/ignite-2017-open-seats-securely-enabling-saas-adoption-customer-panel\/\">Securely Enabling SaaS Adoption \u2013 A Customer Panel<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/04\/ignite-2017-open-seats-securing-host-sensitive-applications-running-vms-containers-safely\/\">Securing the Host for Sensitive Applications: Running Your VMs and Containers Safely<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/04\/ignite-2017-open-seats-whats-new-for-the-vm-series-on-azure\/\">What's New for the VM-Series on AWS <\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-saas-trends-threats-risks-numbers\/\">SaaS Trends, Threats, and Risks, by the Numbers<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-best-practices-safely-enabling-saas-applications\/\">Best Practices for Safely Enabling SaaS Applications<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-deconstructing-dns-bad-guys-abuse-dns-avoid-detection\/\">Deconstructing DNS: How Bad Guys Abuse DNS To Avoid Detection<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-ensure-security-disaster-recovery-process\/\">How to Ensure the Security of the Disaster Recovery Process<\/a><\/li>\n<\/ul>\n<p>Take a look at <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/241258\">Live Demo: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>May 9, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/224842\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>May 10, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/246793\">Live Webinar: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>May 16, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/240444\">Eat &amp; Learn: Credential Theft &amp; Phishing<\/a><\/p>\n<ul>\n<li>May 16, 2016<\/li>\n<li>Dunedin New Zealand<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Catch up on the top Palo Alto Networks news of the week!<\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[249,3678,1869,2052,3654,1161,586],"coauthors":[1515],"class_list":["post-29130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-cyber-security-canon","tag-guardians","tag-ignite-2017","tag-john-davis","tag-kazuar","tag-mssp","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/29130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=29130"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/29130\/revisions"}],"predecessor-version":[{"id":33577,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/29130\/revisions\/33577"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=29130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=29130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=29130"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=29130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}