{"id":32377,"date":"2017-06-03T04:00:54","date_gmt":"2017-06-03T11:00:54","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=32377"},"modified":"2017-06-08T11:55:57","modified_gmt":"2017-06-08T18:55:57","slug":"palo-alto-networks-news-week-june-3-2017","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/06\/palo-alto-networks-news-week-june-3-2017\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 June 3, 2017"},"content":{"rendered":"<p>Platform Falcon? Endpoint Turtle? Find out who your Palo Alto Networks Ignite \u201917 security guardian is.<\/p>\n<div class=\"quizz-container\" data-width=\"100%\" data-iframe-title=\"QUIZ: What Kind of Ignite Guardian Are You?\" data-height=\"auto\" data-quiz=\"385597\"><\/div>\n<p><script src=\"\/\/dcc4iyjchzom0.cloudfront.net\/widget\/loader.js\" async><\/script><br \/>\nDid you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry \u2013 we\u2019ve rounded up our top news and views right here:<\/p>\n<ul>\n<li>Palo Alto Networks Unit 42 shared a new piece of research:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/unit42-dissection-esteemaudit-windows-remote-desktop-exploit\/\">A Dissection of the \u201cEsteemAudit\u201d Windows Remote Desktop Exploit<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/06\/unit42-palo-alto-networks-unit-42-vulnerability-research-may-2017-disclosures\/\">Palo Alto Networks Unit 42 Vulnerability Research May 2017 Disclosures<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Richard Wartell counts down to the launch of the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/06\/unit42-labyrenth-ctf-2017-one-week-countdown\/\">LabyREnth Capture the Flag (CTF) challenge<\/a>.<\/li>\n<li>Steve Regini explained how 5G network slicing is <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/5g-network-slicing-catalyst-secure-virtualized-epc\/\">the catalyst for a Secure, Virtualized EPC<\/a>.<\/li>\n<li>Stephanie Johnson showed us how to <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/can-classify-apps-time-hint-custom-app-ids\/\">classify all apps all the time with App-ID<\/a>.<\/li>\n<\/ul>\n<p>Have you registered for <a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\">Palo Alto Networks Ignite \u201817<\/a> Security Conference? Join over 4,000 security professionals in Vancouver for the most exciting cybersecurity conference of the year! Take your cybersecurity skills to the next level at one of our many <a href=\"https:\/\/ignite.paloaltonetworks.com\/forms\/regform.html?referer=null&amp;utm_medium=social-owned-promo&amp;utm_source=Social+Media\">hands-on sessions<\/a>, including the ones below which are filling up quickly:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/04\/ignite-2017-open-seats-securely-enabling-saas-adoption-customer-panel\/\">Securely Enabling SaaS Adoption \u2013 A Customer Panel<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/04\/ignite-2017-open-seats-securing-host-sensitive-applications-running-vms-containers-safely\/\">Securing the Host for Sensitive Applications: Running Your VMs and Containers Safely<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/04\/ignite-2017-open-seats-whats-new-for-the-vm-series-on-azure\/\">What's New for the VM-Series on AWS <\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-saas-trends-threats-risks-numbers\/\">SaaS Trends, Threats, and Risks, by the Numbers<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-best-practices-safely-enabling-saas-applications\/\">Best Practices for Safely Enabling SaaS Applications<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-deconstructing-dns-bad-guys-abuse-dns-avoid-detection\/\">Deconstructing DNS: How Bad Guys Abuse DNS To Avoid Detection<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-ensure-security-disaster-recovery-process\/\">How to Ensure the Security of the Disaster Recovery Process<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-advanced-endpoint-protection-traps-vakifbank\/\">Advanced Endpoint Protection with Traps at VakifBank<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/reasons-attend-ignite-17-aws-microsoft-azure-focus\/\">Reasons to Attend Ignite \u201917: An AWS and Microsoft Azure Focus<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-applying-next-generation-platform-approach-evolving-service-provider-network-ecosystems\/\">Applying a Next-Generation Platform Approach to Evolving Service Provider Network Ecosystems<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-compliance-best-practices-devops\/\">Best Practices for DevOps<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-safe-networking\/\">Safe Networking<\/a><\/li>\n<li><a href=\"Threat%20Research\/Unit%2042%20Track\">Threat Research\/Unit 42 Track<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-moving-azure-3rd-times-charm\/\">Moving to Azure: 3rd Time\u2019s the Charm<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-migrating-data-center-security-legacy-cloud-architectures\/\">Migrating Data Center Security from Legacy to Cloud Architectures<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-rethink-security-saas-power-platform\/\">Rethink Security for SaaS \u2013 Power of the Platform<\/a><\/li>\n<\/ul>\n<p>Take a look at <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/247883\">AGC CXO Roundtable<\/a><\/p>\n<ul>\n<li>June 6, 2017<\/li>\n<li>Melbourne, Australia<\/li>\n<\/ul>\n<p><a href=\"webinar:%20How%20to%20Prevent%20Breaches%20through%20Application%20Controls\">Webinar: How to Prevent Breaches through Application Controls<\/a><\/p>\n<ul>\n<li>June 6, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/248040\">Preventing Credential-based Attacks in Financial Services<\/a><\/p>\n<ul>\n<li>June 7, 2017<\/li>\n<li>Tustin, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/248414\">Preventing Credential-based Attacks in Healthcare<\/a><\/p>\n<ul>\n<li>June 7, 2017<\/li>\n<li>Tustin, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/246062\">Cybersecurity Summit \u2013 Ho Chi Minh City<\/a><\/p>\n<ul>\n<li>June 8, 2017<\/li>\n<li>Ho Chi Minh City, Vietnam<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/248019\">Preventing Credential-Based Attacks<\/a><\/p>\n<ul>\n<li>June 8, 2017<\/li>\n<li>San Jose, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/248223\">Preventing Credential-Based Attacks<\/a><\/p>\n<ul>\n<li>June 8, 2017<\/li>\n<li>San Diego, CA<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Catch up on all the top Palo Alto Networks news of the week. <\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[1208,59,3808,937,586],"coauthors":[1515],"class_list":["post-32377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-adobe-flash","tag-app-id","tag-esteemaudit","tag-service-provider","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/32377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=32377"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/32377\/revisions"}],"predecessor-version":[{"id":33565,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/32377\/revisions\/33565"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=32377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=32377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=32377"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=32377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}