{"id":5916,"date":"2014-06-20T14:00:55","date_gmt":"2014-06-20T21:00:55","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5916"},"modified":"2021-03-22T07:41:00","modified_gmt":"2021-03-22T14:41:00","slug":"palo-alto-networks-news-week-june-20","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/06\/palo-alto-networks-news-week-june-20\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 June 20"},"content":{"rendered":"<p>Here\u2019s the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\">Palo Alto Networks news<\/a>\u00a0from this past week.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Did you catch our CEO Mark McLaughlin on Countdown to the Closing Bell with Liz Claman last week? <a href=\"http:\/\/bit.ly\/1qWSHFm\" rel=\"nofollow,noopener\" >Check out the interview<\/a>.<\/p>\n<p><!--more--><\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"404\"><span class=\"ar-custom\" style=\"padding-bottom:54.7%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5886 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/mark-on-FBN.png\" alt=\"mark on FBN\" width=\"404\" height=\"221\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/mark-on-FBN.png 404w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/mark-on-FBN-230x125.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/mark-on-FBN-73x40.png 73w\" sizes=\"auto, (max-width: 404px) 100vw, 404px\" \/><\/span><\/div><\/center>In this month\u2019s <a href=\"http:\/\/bit.ly\/1nk7oQD\" rel=\"nofollow,noopener\" >Customer Spotlight<\/a>, hear from Phil Cummings, security administrator at Health Information Technology Services Nova Scotia, on how the organization is tapping the power of Palo Alto Networks WildFire technology.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:57.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5917 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Untitled-500x287.png\" alt=\"Untitled\" width=\"500\" height=\"287\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Untitled-500x287.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Untitled-230x132.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Untitled-510x293.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Untitled-69x40.png 69w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Untitled.png 516w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Check out <a href=\"http:\/\/bit.ly\/1oGdlN9\" rel=\"nofollow,noopener\" >this video<\/a> detailing findings from our 2014 Application Usage and Threat Report on how common sharing applications can start multi-phased attacks.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:52%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5918 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Untitled1-500x260.png\" alt=\"Untitled\" width=\"500\" height=\"260\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Untitled1-500x260.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Untitled1-230x119.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Untitled1-76x40.png 76w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Untitled1.png 510w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Also, are there regional differences in enterprise application usage and threats? Find out the answer <a href=\"http:\/\/bit.ly\/1kO0pwo\" rel=\"nofollow,noopener\" >here<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:71.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5758 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1-500x359.png\" alt=\"AUTR visualization tool\" width=\"500\" height=\"359\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1-500x359.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1-230x165.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1-417x300.png 417w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1-55x40.png 55w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1.png 692w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Get your #pa7050pic submissions in before end of June. Need inspiration? Check out this picture taken by our own Brian Tokuyoshi in Dubai! Find more information and instructions for how to enter <a href=\"http:\/\/bit.ly\/1nPGUZ0\" rel=\"nofollow,noopener\" >here<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:150%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5905 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/MG_3454-500x750.jpg\" alt=\"_MG_3454\" width=\"500\" height=\"750\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/MG_3454-500x750.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/MG_3454-230x345.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/MG_3454-199x300.jpg 199w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/MG_3454-26x40.jpg 26w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/MG_3454.jpg 1333w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Tsugunori Sugawara, senior product marketing manager, talks about attacks by app abuse &amp; how to prevent them in <a href=\"http:\/\/bit.ly\/1i4MnvY\" rel=\"nofollow,noopener\" >this TechTarget Japan article<\/a>.<\/p>\n<p>Guest blogger Lloyd McCoy Jr of immixGroup <a href=\"http:\/\/bit.ly\/1i5xDwJ\" rel=\"nofollow,noopener\" >details<\/a> four considerations for the government\u2019s move to virtualization &amp; cloud.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:20%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5889 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/immixGroup_3D_4c-EPS-version-500x100.jpg\" alt=\"immixGroup_3D_4c EPS version\" width=\"500\" height=\"100\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/immixGroup_3D_4c-EPS-version-500x100.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/immixGroup_3D_4c-EPS-version-230x46.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/immixGroup_3D_4c-EPS-version-510x102.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/immixGroup_3D_4c-EPS-version-198x40.jpg 198w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/immixGroup_3D_4c-EPS-version.jpg 730w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks Manager of Systems Engineering A\/NZ Gavin Coulthard offers best practices for securing business networks during World Cup games in <a href=\"http:\/\/bit.ly\/1kYcUdt\" rel=\"nofollow,noopener\" >this ARNnet article<\/a>. Coulthard also warns about the continuing concern surrounding Heartbleed vulnerability in <a href=\"http:\/\/bit.ly\/1i4N4W4\" rel=\"nofollow,noopener\" >this Techday article<\/a>.<\/p>\n<p>Check out a <a href=\"http:\/\/bit.ly\/1lscCqy\" rel=\"nofollow,noopener\" >few of our highlights<\/a> from Interop Tokyo 2014 last week.<\/p>\n<figure id=\"attachment_5869\" aria-describedby=\"caption-attachment-5869\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:67%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-5869 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Tokyo_2014-06-13_DSC05801-500x335.jpg\" alt=\"Rick Howard, Chief Security Officer of Palo Alto Networks, gave a keynote at Interop Tokyo 2014.\" width=\"500\" height=\"335\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Tokyo_2014-06-13_DSC05801-500x335.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Tokyo_2014-06-13_DSC05801-230x154.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Tokyo_2014-06-13_DSC05801-446x300.jpg 446w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Tokyo_2014-06-13_DSC05801-59x40.jpg 59w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><figcaption id=\"caption-attachment-5869\" class=\"wp-caption-text\">Rick Howard, Chief Security Officer of Palo Alto Networks, gave a keynote at Interop Tokyo 2014.<\/figcaption><\/figure>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIzMA==\">Building a Zero Trust Approach to Network Security<\/a><br \/>\nWhen: June 24, 2014 from 11:00 AM - 12:00 PM EST<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIyNA==\">Palo Alto Networks Ultimate Test Drive<\/a><br \/>\nWhen: June 24, 2014 from 10:30 AM - 2:30 PM CST<br \/>\nWhere: Austin, TX<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI0Ng==\">Webinar: Combat APTs with Palo Alto Networks<\/a><br \/>\nWhen: June 24, 2014 from 9:30 AM - 10:30 AM EET<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA3Nw==\">FREE Introduction To True Next-Generation Palo Alto Networks Firewalls<\/a><br \/>\nWhen: June 25, 2014 from 8:00 AM - 10:00 AM PST<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTgxNQ==\">Next Generation Security Technical Workshop<\/a><br \/>\nWhen: June 25, 2014 from 10:00 AM - 1:00 PM GMT<br \/>\nWhere: London<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIyNw==\">Palo Alto Networks: Live Demo<\/a><br \/>\nWhen: June 25, 2014 from 9:00 AM - 10:00 AM PST<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI2NQ==\">Strategies that Work for Advanced Persistent Threat Prevention<\/a><br \/>\nWhen: June 25, 2014 from 2:00 PM - 3:00 PM EST<br \/>\nWhere: Sadfa, NY<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIzNQ==\">Combat APTs with Palo Alto Networks<\/a><br \/>\nWhen: June 26, 2014 from 10:30 AM - 11:30 AM GMT+8:00<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI3Mw==\">SecureTOUR Mobility &amp; Security<\/a> [Dutch]<br \/>\nWhen: June 26, 2014 from 1:30 PM - 5:00 PM CET<br \/>\nWhere: Sliedrecht<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI2MA==\">Ultimate Test Drive - Melville, NY<\/a><br \/>\nWhen: June 26, 2014 from 8:30 AM - 1:00 PM EST<br \/>\nWhere: Melville, NY<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI3NA==\">Webinar: Les cyber-attaques actuelles<\/a> [French]<br \/>\nWhen: June 26, 2014 from 10:30 AM - 11:30 AM CET<br \/>\nWhere: Online<\/p>\n<p>Webinar: Exploit-Wolf im Schafspelz - versteckte Cyber\u200b\u200b-Bedrohungen [German]<br \/>\nWhen: June 27, 2014 from 12:00 PM - 1:00 PM CET<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIyOA==\">Palo Alto Networks: Live Demo<\/a><br \/>\nWhen: July 2, 2014 from 9:00 AM - 10:00 AM PST<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI1OA==\">Ultimate Test Drive Workshop Auckland<\/a><br \/>\nWhen: July 2, 2014 from 9:00 AM - 12:30 PM GMT+12:00<br \/>\nWhere: Auckland<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI1OQ==\">Ultimate Test Drive Workshop Wellington<\/a><br \/>\nWhen: July 4, 2014 9:00 AM - 12:30 PM GMT+12:00<br \/>\nWhere: Wellington<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s the top Palo Alto Networks news\u00a0from this past week. &nbsp; &nbsp; Did you catch our CEO Mark McLaughlin on Countdown to the Closing Bell with Liz Claman last week? Check out &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[134,393,403,318],"coauthors":[709],"class_list":["post-5916","post","type-post","status-publish","format-standard","hentry","category-news-of-the-week","tag-autr","tag-customer","tag-events-2","tag-pa-7050"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5916"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5916\/revisions"}],"predecessor-version":[{"id":11328,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5916\/revisions\/11328"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5916"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}