{"id":5966,"date":"2014-06-27T16:30:47","date_gmt":"2014-06-27T23:30:47","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5966"},"modified":"2021-03-22T07:43:32","modified_gmt":"2021-03-22T14:43:32","slug":"palo-alto-networks-news-week-june-27","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/06\/palo-alto-networks-news-week-june-27\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 June 27"},"content":{"rendered":"<p>Here\u2019s a roundup of top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a>\u00a0from this past week.<\/p>\n<p>&nbsp;<\/p>\n<p>A number of you have asked if we noticed any regional patterns based on the data in our 2014 Application Usage and Threat Report (AUTR) pertaining to the applications appearing on networks that are capable of using SSL encryption. <a href=\"http:\/\/bit.ly\/1yFYRPu\" target=\"_blank\" rel=\"noopener\">Find out what we uncovered<\/a>.<\/p>\n<p>We also found that nearly 99 percent of all malware logs were generated by a single threat across a single application: unknown UDP. <a href=\"http:\/\/bit.ly\/1o7a3il\" target=\"_blank\" rel=\"noopener\">Learn more<\/a> about cyber activities involving unknown UDP and also how to implement proactive controls.<\/p>\n<p><center><a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\"><div style=\"max-width:100%\" data-width=\"300\"><span class=\"ar-custom\" style=\"padding-bottom:83.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-5715 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250.jpg\" alt=\"AUTR_banner_300x250\" width=\"300\" height=\"250\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250-230x191.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250-48x40.jpg 48w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/span><\/div><\/a><\/center>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>Palo Alto Networks CSO Rick Howard <a href=\"http:\/\/bit.ly\/1q5vzXY\" target=\"_blank\" rel=\"noopener\">addressed<\/a> attendees at the 2014 Gartner Security and Risk Management Summit this week on how to build a cyber intelligence team.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:56.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5934 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/gartner-4-500x281.jpg\" alt=\"gartner 4\" width=\"500\" height=\"281\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/gartner-4-500x281.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/gartner-4-230x129.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/gartner-4-510x287.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/gartner-4-71x40.jpg 71w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>We love the creativity we've seen with the Picture It contest \u2013 keep sending your new photos! <a href=\"http:\/\/bit.ly\/1nPGUZ0\" target=\"_blank\" rel=\"noopener\">Enter now for a chance to win<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"478\"><span class=\"ar-custom\" style=\"padding-bottom:55.86%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5147 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/pa7050pic-fold.png\" alt=\"pa7050pic fold\" width=\"478\" height=\"267\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/pa7050pic-fold.png 478w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/pa7050pic-fold-230x128.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/pa7050pic-fold-71x40.png 71w\" sizes=\"auto, (max-width: 478px) 100vw, 478px\" \/><\/span><\/div><\/p>\n<p>Remediation and incident response just don't go far enough when it comes to protecting critical assets. Cybersecurity expert Tim Treat <a href=\"http:\/\/bit.ly\/1lV3l0y\" target=\"_blank\" rel=\"noopener\">examines<\/a> the fundamental need for prevention in an enterprise security platform.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1vdXXoX\" target=\"_blank\" rel=\"noopener\">Customer Spotlight<\/a>: Find out how\u00a0standardizing on the Palo Alto Networks next-generation security platform saves a manufacturing leader millions in IT costs.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"52\"><span class=\"ar-custom\" style=\"padding-bottom:90.38%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5964 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/CAME-logo.jpg\" alt=\"CAME logo\" width=\"52\" height=\"47\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/CAME-logo.jpg 52w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/CAME-logo-44x40.jpg 44w\" sizes=\"auto, (max-width: 52px) 100vw, 52px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>We partnered with Ixia and Singapore\u2019s Infocomm Development Authority Labs to complete <a href=\"http:\/\/bit.ly\/1rzq9SP\" target=\"_blank\" rel=\"noopener\">first Cyber Range exercise<\/a> in Singapore.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5951 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7-500x375.jpeg\" alt=\"image7\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7-500x375.jpeg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7-230x172.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7-400x300.jpeg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7-53x40.jpeg 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7.jpeg 1632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><strong>Recent Global Coverage<\/strong><\/p>\n<p><a href=\"http:\/\/bit.ly\/1sHV2Zs\" target=\"_blank\" rel=\"noopener\">TechDay<\/a><\/p>\n<p>Mobile security scare\u2026 Should Kiwi enterprises care? Gavin Coulthard of Palo Alto Networks comments.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"100\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-5967 size-thumbnail lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Techday-100x100.jpeg\" alt=\"Techday\" width=\"100\" height=\"100\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Techday-100x100.jpeg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Techday-230x229.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Techday-300x300.jpeg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Techday-40x40.jpeg 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Techday.jpeg 400w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/span><\/div><\/center><a href=\"http:\/\/bit.ly\/1qiikB0\" target=\"_blank\" rel=\"noopener\">01net.CIO<\/a><\/p>\n<p>1,8 milioni di euro di costi It in meno all'anno per Came Group<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"165\"><span class=\"ar-custom\" style=\"padding-bottom:33.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5971 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/01net.png\" alt=\"01net\" width=\"165\" height=\"55\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/01net.png 165w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/01net-120x40.png 120w\" sizes=\"auto, (max-width: 165px) 100vw, 165px\" \/><\/span><\/div><\/center><a href=\"http:\/\/bit.ly\/VnO9hr\" target=\"_blank\" rel=\"noopener\">CISO magazine<\/a><\/p>\n<p>Jonathan Tan, Managing Director, ASEAN Sales, spoke to CISO magazine about cybersecurity in Indonesia.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:32.17%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-5969 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/CISO-230x74.jpg\" alt=\"CISO\" width=\"230\" height=\"74\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/CISO-230x74.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/CISO-124x40.jpg 124w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/CISO.jpg 496w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/center><a href=\"http:\/\/bit.ly\/1qeJOd2\" target=\"_blank\" rel=\"noopener\">The Jakarta Post<\/a><\/p>\n<p>Palo Alto Networks expands RI presence to tap growing demand<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"180\"><span class=\"ar-custom\" style=\"padding-bottom:22.22%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5970 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/jakarta.png\" alt=\"jakarta\" width=\"180\" height=\"40\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIyOA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: July 2, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI1OA==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Auckland<\/a><\/p>\n<ul>\n<li>When: July 2, 2014 from 9:00 AM - 12:30 PM GMT+12:00<\/li>\n<li>Where: Auckland<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI1OQ==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Wellington<\/a><\/p>\n<ul>\n<li>When: July 4, 2014 from 9:00 AM - 12:30 PM GMT+12:00<\/li>\n<li>Where: Wellington<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI2OQ==\" target=\"_blank\" rel=\"noopener\">2014 Calgary Stampede GMC Rangeland Derby<\/a><\/p>\n<ul>\n<li>When: July 7, 2014 from 4:30 PM - 9:30 PM MST<\/li>\n<li>Where: Calgary, AB<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI3MA==\" target=\"_blank\" rel=\"noopener\">2014 Calgary Stampede GMC Rangeland Derby<\/a><\/p>\n<ul>\n<li>When: July 9, 2014 from 4:30 PM - 9:30 PM MST<\/li>\n<li>Where: Calgary, AB<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI4OQ==\" target=\"_blank\" rel=\"noopener\">Five Lessons in Mobile Security<\/a><\/p>\n<ul>\n<li>When: July 9, 2014 from 11:00 AM \u2013 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI0MA==\" target=\"_blank\" rel=\"noopener\">Strategies that Work for Advanced Persistent Threat Prevention<\/a><\/p>\n<ul>\n<li>When: July 10, 2014 from 11:00 AM - 12:00 PM GMT+10:00<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI2MQ==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive \u2013 Pittsburgh<\/a><\/p>\n<ul>\n<li>When: July 10, 2014 from 9:00 AM - 1:00 PM EST<\/li>\n<li>Where: Canonsburg, PA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIyMw==\" target=\"_blank\" rel=\"noopener\">Estrategias que funcionan para la prevencion de APTs<\/a> [Spanish]<\/p>\n<ul>\n<li>When: July 11, 2014 from 11:00 AM - 12:00 PM CST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a roundup of top Palo Alto Networks news\u00a0from this past week. &nbsp; A number of you have asked if we noticed any regional patterns based on the data in our 2014 &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[485,134,389,117,544,534,542,345,543],"coauthors":[709],"class_list":["post-5966","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-application-usage-and-threat-report","tag-autr","tag-contest","tag-gartner","tag-infocomm-development-authority-labs","tag-ixia","tag-picture-it","tag-rick-howard","tag-tim-treat"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5966"}],"version-history":[{"count":9,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5966\/revisions"}],"predecessor-version":[{"id":128767,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5966\/revisions\/128767"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5966"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}