{"id":5570,"date":"2014-05-14T06:00:02","date_gmt":"2014-05-14T13:00:02","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5570"},"modified":"2014-07-16T08:23:56","modified_gmt":"2014-07-16T15:23:56","slug":"tomorrow-security-briefing-on-latest-ie-vulnerability-impact-on-ics","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/05\/tomorrow-security-briefing-on-latest-ie-vulnerability-impact-on-ics\/","title":{"rendered":"Tomorrow: Latest IE Vulnerability's Impact on ICS"},"content":{"rendered":"<p>Join Palo Alto Networks and the ICS-ISAC for a <a href=\"https:\/\/attendee.gotowebinar.com\/register\/7655407241369701377\" rel=\"nofollow,noopener\"  target=\"_blank\">special security briefing tomorrow<\/a>, May 15 from 11 a.m. \u2013 12 p.m. EDT, on the latest IE vulnerability's impact on ICS.<\/p>\n<p>With the pervasiveness of Internet Explorer in the ICS environment and the severity of the latest IE vulnerability (MS14-021), it is important to be aware of the impact this can have on your security posture.<!--more--><\/p>\n<p>Alon Livne, Palo Alto Networks Manager, Security Research, and Del Rodillas, Palo Alto Networks Product Marketing, SCADA\/ICS, will present an overview of how attacks exploiting this vulnerability work, and key recommendations on how to best protect your organization. <a href=\"https:\/\/attendee.gotowebinar.com\/register\/7655407241369701377\" rel=\"nofollow,noopener\"  target=\"_blank\">Register now<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Join Palo Alto Networks and the ICS-ISAC for a special security briefing tomorrow, May 15 from 11 a.m. \u2013 12 p.m. EDT, on the latest IE vulnerability's impact on ICS. With the &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,566],"tags":[411,280,240,92,325,97],"coauthors":[],"class_list":["post-5570","post","type-post","status-publish","format-standard","hentry","category-events","category-scada-ics","tag-ics","tag-ics-isac","tag-internet-explorer","tag-scada","tag-vulnerability","tag-webinar"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5570"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5570\/revisions"}],"predecessor-version":[{"id":5574,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5570\/revisions\/5574"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5570"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}