{"id":5536,"date":"2014-05-09T13:30:49","date_gmt":"2014-05-09T20:30:49","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5536"},"modified":"2021-03-22T07:28:31","modified_gmt":"2021-03-22T14:28:31","slug":"palo-alto-networks-news-week-may-9","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/05\/palo-alto-networks-news-week-may-9\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 May 9"},"content":{"rendered":"<p>Here\u2019s all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a>\u00a0from this past week.<\/p>\n<p>Gal Badishi <a href=\"http:\/\/bit.ly\/1fQdYQl\" target=\"_blank\" rel=\"noopener\">discusses CVE-2014-1776<\/a> and how the reuse of code makes attacks easier than ever.<\/p>\n<p>We <a href=\"http:\/\/bit.ly\/1fN03KV\" target=\"_blank\" rel=\"noopener\">joined<\/a> the Symantec Advanced Threat Protection Alliance.<\/p>\n<p>CRN's Robert Westervelt spent time with Ron Myers &amp; Tracy Pallas at Ignite 2014 to talk about <a href=\"http:\/\/bit.ly\/1njxswi\" target=\"_blank\" rel=\"noopener\">the commitment to our partners<\/a>.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"344\"><span class=\"ar-custom\" style=\"padding-bottom:54.65%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5537 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/crn-rob-w.png\" alt=\"crn rob w\" width=\"344\" height=\"188\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/crn-rob-w.png 344w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/crn-rob-w-230x125.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/crn-rob-w-73x40.png 73w\" sizes=\"auto, (max-width: 344px) 100vw, 344px\" \/><\/span><\/div><!--more--><\/center><a href=\"http:\/\/bit.ly\/QfbE90\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Tip of the Week<\/a>: Experience our enterprise security platform at an Ultimate Test Drive workshop near you.<\/p>\n<p>In a series of <a href=\"http:\/\/bit.ly\/1jpfLvc\" target=\"_blank\" rel=\"noopener\">upcoming seminars<\/a> in Australia and New Zealand, our own Matt Keil will discuss the intertwined relationship between cyberattacks and applications, and present our latest findings on enterprise application usage.<\/p>\n<p>We <a href=\"http:\/\/bit.ly\/SxV4TR\" target=\"_blank\" rel=\"noopener\">announced<\/a> the PA-7050 Picture It winner for the month of April. Have you <a href=\"http:\/\/media.paloaltonetworks.com\/events\/pa7050pic\/\">submitted<\/a> your entry for May yet?<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5514 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/4.11_NAM-US_AZurita_ESPN-WINNER-500x375.jpg\" alt=\"4.11_NAM-US_AZurita_ESPN-WINNER\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/4.11_NAM-US_AZurita_ESPN-WINNER-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/4.11_NAM-US_AZurita_ESPN-WINNER-230x172.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/4.11_NAM-US_AZurita_ESPN-WINNER-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/4.11_NAM-US_AZurita_ESPN-WINNER-53x40.jpg 53w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Check out <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/rick\/\" target=\"_blank\" rel=\"noopener\">Rick Howard\u2019s<\/a> newest entry to the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Canon<\/a> series, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/05\/cybersecurity-canon-secrets-lies\/\" target=\"_blank\" rel=\"noopener\">Secrets and Lies: Digital Security in a Networked World (2000) by Bruce Schneier<\/a>.<\/p>\n<p>Mark McLaughlin &amp; Raj Shah <a href=\"http:\/\/bit.ly\/1uw1Wj3\" target=\"_blank\" rel=\"noopener\">talked security marketplace consolidation<\/a> with The Information's Katie Benner: (Subscription)<\/p>\n<p>For those who work in government and who would like to attend our <a href=\"http:\/\/bit.ly\/1j7xjqC\" target=\"_blank\" rel=\"noopener\">Federal Expert Forum<\/a> next week in Washington, DC, <a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTk5Mg==\/\" target=\"_blank\" rel=\"noopener\">please register here<\/a>. This free event on May 15 will cover the unique IT security demands of U.S. federal agencies.<\/p>\n<p>As a continuing part of our government and public sector activities, <a href=\"http:\/\/bit.ly\/1p7oFBJ\" target=\"_blank\" rel=\"noopener\">we are featured<\/a> on Federal News Radio\/WTOP in the United States over the next few months. Check it out to hear Rick and Steve Hoffman, VP, U.S. Federal, talk about what advanced government security teams are doing today.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"343\"><span class=\"ar-custom\" style=\"padding-bottom:54.52%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5422 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11.png\" alt=\"Untitled\" width=\"343\" height=\"187\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11.png 343w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11-230x125.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11-73x40.png 73w\" sizes=\"auto, (max-width: 343px) 100vw, 343px\" \/><\/span><\/div><\/center>Join fellow IT Managers &amp; Security Experts at the <a href=\"http:\/\/bit.ly\/1gyHBzW\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Customer Forum<\/a> on May 21 in The Netherlands.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5347 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-500x166.jpg\" alt=\"PANW Customer Forum\" width=\"500\" height=\"166\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-500x166.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-230x76.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-510x170.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-120x40.jpg 120w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum.jpg 660w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Here are more <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> you should know about:<\/p>\n<ul>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA5Mw==\" target=\"_blank\" rel=\"noopener\">The Relationship Between Cyber Attacks and Applications<\/a>\n<ul>\n<li>When: May 12, 2014 from 12:00 PM - 1:30 PM GMT+10:00<\/li>\n<li>Where: Melbourne<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA5NA==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Melbourne<\/a>\n<ul>\n<li>When: May 12, 2014 from 11:00 AM - 3:00 PM GMT+10:00<\/li>\n<li>Where: Melbourne<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA5Mg==\" target=\"_blank\" rel=\"noopener\">The Relationship Between Cyber Attacks and Applications<\/a>\n<ul>\n<li>When: May 13, 2014 9:00 AM - 10:00 AM GMT+10:00<\/li>\n<li>Where: Canberra<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA4OQ==\" target=\"_blank\" rel=\"noopener\">The Ultimate Test Drive - Data Center NJ May 13<\/a>\n<ul>\n<li>When: May 13, 2014 from 8:30 AM - 1:00 PM EST<\/li>\n<li>Where: Iselin, NJ<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA5NQ==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Canberra<\/a>\n<ul>\n<li>When: May 13, 2014 from 11:00 AM - 3:00 PM GMT+10:00<\/li>\n<li>Where: Canberra<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA4MQ==\" target=\"_blank\" rel=\"noopener\">Expose the Underground<\/a>\n<ul>\n<li>When: May 14, 2014 from 3:30 PM - 6:30 PM EST<\/li>\n<li>Where: Pittsburgh, PA<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTk3NQ==\" target=\"_blank\" rel=\"noopener\">Leadership in Difficult Times<\/a>\n<ul>\n<li>When: May 14, 2014 from 9:00 AM - 12:00 PM EST<\/li>\n<li>Where: Ottawa, ON<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjExMw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a>\n<ul>\n<li>When: May 14, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA5MQ==\" target=\"_blank\" rel=\"noopener\">The Relationship Between Cyber Attacks and Applications<\/a>\n<ul>\n<li>When: May 14, 2014 from 9:00 AM - 10:00 AM GMT+10:00<\/li>\n<li>Where: Brisbane<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEzNA==\" target=\"_blank\" rel=\"noopener\">Mini Beer Pairing Luncheon Event<\/a>\n<ul>\n<li>When: May 15, 2014 from 11:30 AM - 1:30 PM EST<\/li>\n<li>Where: Charlotte, NC<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEwMg==\" target=\"_blank\" rel=\"noopener\">The Ultimate Test Drive - Data Center VA May 15<\/a>\n<ul>\n<li>When: May 15, 2014 from 8:30 AM - 1:00 PM EST<\/li>\n<li>Where: Reston, VA<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA4Mw==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive<\/a>\n<ul>\n<li>When: May 15, 2014 from 8:30 AM - 12:00 PM PST<\/li>\n<li>Where: Vancouver, BC<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA5MA==\" target=\"_blank\" rel=\"noopener\">The Relationship Between Cyber Attacks and Applications<\/a>\n<ul>\n<li>When: May 16, 2014 from 9:00 AM - 10:00 AM GMT+10:00<\/li>\n<li>Where: Sydney<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA5Nw==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Sydney<\/a>\n<ul>\n<li>When: May 16, 2014 from 11:00 AM - 3:00 PM GMT+10:00<\/li>\n<li>Where: Sydney<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEwNQ==\" target=\"_blank\" rel=\"noopener\">Application or Threat: 3 keys to sniffing them out<\/a>\n<ul>\n<li>When: May 20, 2014 from 8:00 AM - 9:30 AM GMT+12:00<\/li>\n<li>Where: Westhaven Marina, Auckland<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTkwNQ==\" target=\"_blank\" rel=\"noopener\">Forum De La S\u00e9curit\u00e9 IT<\/a> [French]\n<ul>\n<li>When: May 20, 2014 from 9:00 AM - 6:00 PM CET<\/li>\n<li>Where: Tlemcen<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE1MQ==\" target=\"_blank\" rel=\"noopener\">Strategies that Work for Advanced Persistent Threat Prevention<\/a>\n<ul>\n<li>When: May 20, 2014 from 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA2Nw==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive - Dalian Enterprises<\/a>\n<ul>\n<li>When: May 20, 2014 from 8:30 AM - 12:00 PM EST<\/li>\n<li>Where: Ottawa, ON<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEzMw==\" target=\"_blank\" rel=\"noopener\">Building a Zero Trust Approach to Network Security<\/a>\n<ul>\n<li>When: May 21, 2014 from 11:00 AM - 12:00 PM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE1OQ==\" target=\"_blank\" rel=\"noopener\">Combat APTs with Palo Alto Networks<\/a>\n<ul>\n<li>When: May 21, 2014 from 10:30 AM - 11:30 AM GMT+5:30<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjExNA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a>\n<ul>\n<li>When: May 21, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA4Ng==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive \u2013 Markham<\/a>\n<ul>\n<li>When: May 22, 2014 from 8:30 AM - 12:00 PM EST<\/li>\n<li>Where: Markham, ON<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA2MA==\" target=\"_blank\" rel=\"noopener\">Unders\u00f6ker ni alternativ till Cisco ASA 5500 ?<\/a> [Swedish]\n<ul>\n<li>When: May 22, 2014 from 3:00 PM - 4:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEzMA==\" target=\"_blank\" rel=\"noopener\">Die Zwei um Zw\u00f6lf: Advanced Persistent Threats und Modern Malware<\/a> [German]\n<ul>\n<li>When: May 23, 2014 from 12:00 PM - 1:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTk4NA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a> [Polish]\n<ul>\n<li>When: May 23, 2014 from 10:00 AM - 11:00 AM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s all of the top Palo Alto Networks news\u00a0from this past week. Gal Badishi discusses CVE-2014-1776 and how the reuse of code makes attacks easier than ever. We joined the Symantec Advanced &hellip;<\/p>\n","protected":false},"author":36,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203,78,195,410],"tags":[394,441,218,451,431,251,217,318,437],"coauthors":[709],"class_list":["post-5536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","category-news-of-the-week","category-partners","category-tip-of-the-week","category-vertical","tag-pa7050pic","tag-advanced-threat-protection-alliance","tag-crn","tag-customer-forum","tag-cve-2014-1776","tag-cybersecurity-canon","tag-ignite-2014","tag-pa-7050","tag-robert-westervelt"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5536"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5536\/revisions"}],"predecessor-version":[{"id":128754,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5536\/revisions\/128754"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5536"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}