{"id":31127,"date":"2017-05-20T04:00:38","date_gmt":"2017-05-20T11:00:38","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=31127"},"modified":"2017-06-08T11:57:28","modified_gmt":"2017-06-08T18:57:28","slug":"palo-alto-networks-news-of-the-week-may-20-2017","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/05\/palo-alto-networks-news-of-the-week-may-20-2017\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 May 20, 2017"},"content":{"rendered":"<div class=\"quizz-container\" data-width=\"100%\" data-iframe-title=\"QUIZ: What Kind of Ignite Guardian Are You?\" data-height=\"auto\" data-quiz=\"385597\">\n<p>Platform Falcon? Endpoint Turtle? Find out who your Palo Alto Networks Ignite \u201917 security guardian is.<\/p>\n<\/div>\n<p><script src=\"\/\/dcc4iyjchzom0.cloudfront.net\/widget\/loader.js\" async><\/script><\/p>\n<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry \u2013 we\u2019ve rounded up our top news and views right here:<\/p>\n<ul>\n<li>Michael Moshiri explained how <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/traps-protections-wanacrypt0r-ransomware-attacks\/\">Traps advanced endpoint protection can protect against WanaCrypt0r ransomware attacks<\/a>.<\/li>\n<li>Mihoko Matsubara examines <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/cso-japan-aiming-close-cybersecurity-skills-gap-tokyo-2020\/\">how Japan is aiming to close the cybersecurity skills gap<\/a> before the Tokyo 2020 games.<\/li>\n<li>Rick Howard shared insight into <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/cso-directors-feel-inadequate-terms-cybersecurity-can\/\">why directors feel inadequate about making cybersecurity decisions, and what they can do to become more confident<\/a>.<\/li>\n<li>Stephanie Johnson gave <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/four-reasons-use-app-id-next-generation-firewall\/\">four reasons to use App-ID on your next-generation firewall<\/a>.<\/li>\n<li>Cybersecurity and live music. This week, we announced our <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-announcing-special-musical-guest\/\">Ignite \u201817 special musical guest<\/a>.<\/li>\n<\/ul>\n<p><strong>Have you registered for <a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\">Palo Alto Networks Ignite \u201817<\/a> Security Conference?<\/strong><br \/>\nJoin over 4,000 security professionals in Vancouver for the most exciting cybersecurity conference of the year! Take your cybersecurity skills to the next level at one of our many <a href=\"https:\/\/ignite.paloaltonetworks.com\/forms\/regform.html?referer=null&amp;utm_medium=social-owned-promo&amp;utm_source=Social+Media\">hands-on sessions<\/a>, including the ones below which are filling up quickly:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/04\/ignite-2017-open-seats-securely-enabling-saas-adoption-customer-panel\/\">Securely Enabling SaaS Adoption \u2013 A Customer Panel<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/04\/ignite-2017-open-seats-securing-host-sensitive-applications-running-vms-containers-safely\/\">Securing the Host for Sensitive Applications: Running Your VMs and Containers Safely<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/04\/ignite-2017-open-seats-whats-new-for-the-vm-series-on-azure\/\">What's New for the VM-Series on AWS <\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-saas-trends-threats-risks-numbers\/\">SaaS Trends, Threats, and Risks, by the Numbers<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-best-practices-safely-enabling-saas-applications\/\">Best Practices for Safely Enabling SaaS Applications<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-deconstructing-dns-bad-guys-abuse-dns-avoid-detection\/\">Deconstructing DNS: How Bad Guys Abuse DNS To Avoid Detection<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-ensure-security-disaster-recovery-process\/\">How to Ensure the Security of the Disaster Recovery Process<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-advanced-endpoint-protection-traps-vakifbank\/\">Advanced Endpoint Protection with Traps at VakifBank<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/reasons-attend-ignite-17-aws-microsoft-azure-focus\/\">Reasons to Attend Ignite \u201917: An AWS and Microsoft Azure Focus<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-applying-next-generation-platform-approach-evolving-service-provider-network-ecosystems\/\">Applying a Next-Generation Platform Approach to Evolving Service Provider Network Ecosystems<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-compliance-best-practices-devops\/\">Best Practices for DevOps<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-safe-networking\/\">Safe Networking<\/a><\/li>\n<li><a href=\"Threat%20Research\/Unit%2042%20Track\">Threat Research\/Unit 42 Track<\/a><\/li>\n<\/ul>\n<p>Take a look at <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/237426\">Virtual Ultimate Test Drive NGFW May 22nd, 2017<\/a><\/p>\n<ul>\n<li>May 22, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/events\/breach-prevention-hong-kong.html\">Breach Prevention Week<\/a><\/p>\n<ul>\n<li>May 23 \u2013 May 26, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/244750\">Cybersecurity Summit \u2013 Surabaya<\/a><\/p>\n<ul>\n<li>May 23, 2017<\/li>\n<li>Kota Surabaya, Indonesia<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/247098\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>May 23, 2017<\/li>\n<li>Bellevue, WA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/247875\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>May 23, 2017<\/li>\n<li>Portland, OR<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/248003\">Phish-Proof Your People and Grab Some \u201cphish\u201d Tacos<\/a><\/p>\n<ul>\n<li>May 23, 2017<\/li>\n<li>Monterey, CA<\/li>\n<\/ul>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/Traps052517\">New Traps v4.0: Advancing Endpoint Security, Again!<\/a><\/p>\n<ul>\n<li>May 25, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"webinar:%20How%20to%20Prevent%20Breaches%20through%20Application%20Controls\">Webinar: How to Prevent Breaches through Application Controls<\/a><\/p>\n<ul>\n<li>June 6, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Catch up on all the top Palo Alto Networks news of the week.<\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[59,403,2097,3782,345,778],"coauthors":[1515],"class_list":["post-31127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-app-id","tag-events-2","tag-mihoko-matsubara","tag-next-gen-firewall","tag-rick-howard","tag-traps"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/31127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=31127"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/31127\/revisions"}],"predecessor-version":[{"id":33571,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/31127\/revisions\/33571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=31127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=31127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=31127"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=31127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}