{"id":5666,"date":"2014-05-23T08:00:52","date_gmt":"2014-05-23T15:00:52","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5666"},"modified":"2021-03-22T07:32:06","modified_gmt":"2021-03-22T14:32:06","slug":"palo-alto-networks-news-week-may-23","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/05\/palo-alto-networks-news-week-may-23\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 May 23"},"content":{"rendered":"<p>Interested in the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a> from this past week? It\u2019s all right here.<\/p>\n<p>&nbsp;<\/p>\n<p>In a three-part series, CSO Rick Howard highlights the importance of understanding different <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/05\/how-well-do-you-understand-your-cyber-adversary-part-1\/#more-5568\" target=\"_blank\" rel=\"noopener\">cyber adversaries<\/a> and their motivations. Check out <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/05\/how-well-do-you-understand-your-cyber-adversary-part-1\/\" target=\"_blank\" rel=\"noopener\">Part 1<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/05\/well-understand-cyber-adversary-part-2\/\" target=\"_blank\" rel=\"noopener\">Part 2<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/05\/well-understand-cyber-adversary-part-3\/\" target=\"_blank\" rel=\"noopener\">Part 3<\/a>.<\/p>\n<p><!--more--><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5607 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/PAN-blue-2.jpg\" alt=\"PAN-blue-2\" width=\"500\" height=\"295\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/PAN-blue-2.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/PAN-blue-2-230x135.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/PAN-blue-2-67x40.jpg 67w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Healthcare organizations are at risk of being the next \u201cTarget\u201d for cyber criminals. We\u2019re encouraging <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/05\/will-healthcare-providers-next-target-cybercriminals\/\" target=\"_blank\" rel=\"noopener\">an AVR<\/a> report with Palo Alto Networks to gain deeper visibility into what\u2019s on your network.<\/p>\n<p>On May 20, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/05\/latest-kuluoz-spam-campaign-kicks\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Wildfire<\/a> detected the start of the latest Kuluoz spam campaign.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:56.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5634 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/Untitled-500x284.png\" alt=\"Untitled\" width=\"500\" height=\"284\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/Untitled-500x284.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/Untitled-230x130.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/Untitled-510x289.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/Untitled-70x40.png 70w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/Untitled.png 827w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/05\/customer-spotlight-relieving-bandwidth-pressure-improving-security-animal-logic\/\" target=\"_blank\" rel=\"noopener\">Customer Spotlight:<\/a> Animal Logic, one of the world\u2019s most accomplished digital studios, relies on Palo Alto Networks next-generation firewall to more efficiently manage its network security.<\/p>\n<p>Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/05\/time-clear-air-forbes-track-microsoft-licensing-claim\/\" target=\"_blank\" rel=\"noopener\">responded<\/a> to the recent Richard Stiennon article in Forbes about Microsoft licensing within embedded systems.<\/p>\n<p>Here are more <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE2Ng==\" target=\"_blank\" rel=\"noopener\">Oppdag hurtig ukjente trusler med utvidet visibilitet og intelligens<\/a>. [Norwegian]<br \/>\nWhen: May 27, 2014 from 3:00 PM - 3:30 PM CET<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE4MQ==\" target=\"_blank\" rel=\"noopener\">Expose the Underground<\/a> [Spanish]<br \/>\nWhen: May 28, 2014 from 8:00 PM - 10:00 PM CST<br \/>\nWhere: Ciudad de Mexico, DF<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTgxNA==\" target=\"_blank\" rel=\"noopener\">Next Generation Security Technical Workshop<\/a><br \/>\nWhen: May 28, 2014 from 10:00 AM - 1:00 PM GMT<br \/>\nWhere: London<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjExNQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><br \/>\nWhen: May 28, 2014 from 9:00 AM - 10:00 AM PST<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE2OQ==\" target=\"_blank\" rel=\"noopener\">Transforming Networks Security with the Software Defined Data Center<\/a><br \/>\nWhen: May 28, 2014 from 1:00 PM - 2:00 PM CET<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA5Ng==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Brisbane<\/a><br \/>\nWhen: May 28, 2014 from 11:00 AM - 3:00 PM GMT+10:00<br \/>\nWhere: Brisbane<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTcyMw==\" target=\"_blank\" rel=\"noopener\">AFCEA: Spring Intelligence Symposium \u2013 Intel<\/a><br \/>\nWhen: May 29, 2014 from 8:00 AM - 6:00 PM EST<br \/>\nWhere: Bethesda, MD<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEzMQ==\" target=\"_blank\" rel=\"noopener\">Combat APTs with Palo Alto Networks<\/a><br \/>\nWhen: May 29, 2014 from 10:30 AM - 11:30 AM GMT+7:00<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE2Mw==\" target=\"_blank\" rel=\"noopener\">Expose the Underground<\/a><br \/>\nWhen: May 29, 2014 from 11:30 AM - 1:30 PM MST<br \/>\nWhere: Edmonton, AB<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE4Mw==\" target=\"_blank\" rel=\"noopener\">Expose the Underground<\/a> [Spanish]<br \/>\nWhen: May 29, 2014 6:30 PM - 9:00 PM CST<br \/>\nWhere: Monterrey<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE2Nw==\" target=\"_blank\" rel=\"noopener\">Oppdag hurtig ukjente trusler med utvidet visibilitet og intelligens<\/a>. [Norwegian]<br \/>\nWhen: May 30, 2014 from 3:00 PM - 3:30 PM CET<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEzMg==\" target=\"_blank\" rel=\"noopener\">Combat APTs with Palo Alto Networks<\/a><br \/>\nWhen: June 3, 2014 10:30 AM \u2013 11:30 AM GMT + 7:00<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE4Ng==\" target=\"_blank\" rel=\"noopener\">Discover Unknown Threats with Extended Visibility and Intelligence<\/a><br \/>\nWhen: June 3, 2014 1:00 PM \u2013 2:00 PM CET<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE2MA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><br \/>\nWhen: June 4, 2014 9:00 AM \u2013 10:00 AM PST<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE4Nw==\" target=\"_blank\" rel=\"noopener\">Discover Unknown Threats with Extended Visibility and Intelligence<\/a><br \/>\nWhen: June 5, 2014 1:00 PM \u2013 2:00 PM CET<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA0MA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo ANZ<\/a><br \/>\nWhen: June 5 2014, 10:00 AM \u2013 11:00 AM GMT + 10:00<br \/>\nWhere: Online<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Interested in the top Palo Alto Networks news from this past week? It\u2019s all right here. &nbsp; In a three-part series, CSO Rick Howard highlights the importance of understanding different cyber adversaries &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[295,155,133,203],"tags":[459,457,1815,139,470,69],"coauthors":[709],"class_list":["post-5666","post","type-post","status-publish","format-standard","hentry","category-customer-spotlight","category-cybersecurity-2","category-events","category-news-of-the-week","tag-cyber-crime","tag-cyber-terrorism","tag-firewall","tag-healthcare-2","tag-kuluoz","tag-wildfire"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5666"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5666\/revisions"}],"predecessor-version":[{"id":128757,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5666\/revisions\/128757"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5666"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}