{"id":38599,"date":"2017-07-22T04:00:09","date_gmt":"2017-07-22T11:00:09","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=38599"},"modified":"2017-07-21T09:22:38","modified_gmt":"2017-07-21T16:22:38","slug":"palo-alto-networks-news-week-july-22-2017","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/07\/palo-alto-networks-news-week-july-22-2017\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 July 22, 2017"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry \u2013 we\u2019ve rounded up our top news and views right here:<\/p>\n<ul>\n<li>Unit 42 shared new research:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/unit42-malspam-targeting-brazil-continues-evolve\/\">Malspam Targeting Brazil Continues to Evolve<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Sean Duca shared key takeaways from the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/cso-new-report-state-cybersecurity-asia-pacific\/\">new report from Palo Alto Networks on the state of cybersecurity in Asia-Pacific<\/a>.<\/li>\n<li>Mark McLaughlin discussed <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/progressive-boards-manage-cyber-risk\/\">how the most progressive boards manage cyber risk<\/a> on Security Roundtable.<\/li>\n<li>Rick Howard reviewed \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/cybersecurity-canon-measure-anything-finding-value-intangibles-business\/\">How to Measure Anything: Finding the Value of \u2018Intangibles\u2019 in Business<\/a>\u201d for the Cybersecurity Canon.<\/li>\n<li>Rae Harrison put the spotlight on Rieter, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/customer-spotlight-worlds-leading-textile-machinery-company-protects-intellectual-property-palo-alto-networks-next-generation-security-platform\/\">the world\u2019s leading textile machinery company and how they protect their intellectual<\/a> property with the Palo Alto Networks Next-Generation Security Platform.<\/li>\n<li>We announced that <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/palo-alto-networks-showcase-iot-honeypot-research-black-hat-2017\/\">Palo Alto Networks will be showcasing IoT Honeypot research<\/a> at Black Hat 2017.<\/li>\n<\/ul>\n<p>Take a look at <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/263688\">Advanced Endpoint Protection Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>July 25, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/240706\">Next-Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>July 26, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/258984\">Ultimate Test Drive \u2013 Adelaide<\/a><\/p>\n<ul>\n<li>July 26, 2017<\/li>\n<li>Adelaide Australia<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/268591\">Preventing Credential-Based Attacks<\/a><\/p>\n<ul>\n<li>July 26, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/257996\">Virtual Ultimate Test Drive - Threat Prevention<\/a><\/p>\n<ul>\n<li>July 28, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Catch up on all the top Palo Alto Networks news of the week.<\/p>\n","protected":false},"author":153,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[200,166,1822,251,3743,191,586],"coauthors":[1515],"class_list":["post-38599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-apac","tag-black-hat","tag-customer-spotlight","tag-cybersecurity-canon","tag-labyrenth-ctf","tag-mark-mclaughlin","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/38599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=38599"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/38599\/revisions"}],"predecessor-version":[{"id":38602,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/38599\/revisions\/38602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=38599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=38599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=38599"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=38599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}