{"id":59842,"date":"2018-01-27T04:00:58","date_gmt":"2018-01-27T12:00:58","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=59842"},"modified":"2018-01-26T11:19:58","modified_gmt":"2018-01-26T19:19:58","slug":"palo-alto-networks-news-week-january-27-2018","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/01\/palo-alto-networks-news-week-january-27-2018\/","title":{"rendered":"Palo Alto Networks News of the Week: January 27, 2018"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry \u2013 we\u2019ve rounded up our top news and views right here:<\/p>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"lKo0EaLecbo\" ><\/lite-youtube><\/div><\/p>\n<p>Join us for the biggest cloud security event of the year! Hosted by <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/epic-cloud-security-event-welcome-salim-ismail\/\">Salim Ismail<\/a>, best-selling author, futurist and technology entrepreneur, THE EPIC CLOUD SECURITY EVENT will feature A-list cloud experts and our own chief product officer, Lee Klarich.\u00a0<strong><a href=\"http:\/\/go.paloaltonetworks.com\/epiccloud\">Register now for The Epic Cloud Security Event<\/a><\/strong><\/p>\n<ul>\n<li>This week we unveiled <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/magnifier-behavioral-analytics\/\">Magnifier behavioral analytics<\/a>. Learn how it rapidly hunts down and stops the stealthiest of threats.<\/li>\n<li>Palo Alto Networks chairman and CEO <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/reaching-for-a-cybersecurity-moonshot-a-message-for-davos-2018\/\">Mark McLaughlin shared his thoughts heading into the World Economic Forum<\/a> annual meeting at Davos.<\/li>\n<li>Unit 42 shared new research\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/unit42-large-scale-monero-cryptocurrency-mining-operation-using-xmrig\/\">Large Scale Monero Cryptocurrency Mining Operation using XMRig<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-east\/\">OilRig uses RGDoor IIS Backdoor on Targets in the Middle East<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/unit42-the-tophat-campaign-attacks-within-the-middle-east-region-using-popular-third-party-services\/\">The TopHat Campaign: Attacks Within the Middle East Region Using Popular Third-Party Services<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Our blog series on critical mistakes to avoid when choosing your next NGFW continued with a lesson on why you shouldn\u2019t <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/5-critical-mistakes-to-avoid-buying-in-to-ngfw-roadmap-features-and-promises\/\">buy into firewall roadmap features and promises<\/a>.<\/li>\n<li>This week\u2019s Threat Brief explored how <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/threat-brief-malware-authors-mine-monero-across-globe-big-way\/\">malware authors mine Monero cryptocurrency<\/a> across the globe.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/ignite.paloaltonetworks.com\/usa?CampaignId=7010g000001IH8U&amp;utm_content=Ignite18USA&amp;utm_medium=SocailMedia&amp;utm_source=twitter\"><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:41.67%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-54450 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/12\/ignite18-blog.jpg\" alt=\"ignite18-blog\" width=\"600\" height=\"250\" \/><\/span><\/div><\/a><\/p>\n<p>Secure your spot at the cybersecurity conference of the year. <a href=\"https:\/\/ignite.paloaltonetworks.com\/usa?CampaignId=7010g000001IH8U&amp;utm_content=Ignite18USA&amp;utm_medium=SocailMedia&amp;utm_source=ResourceCenter\">Register now for Ignite \u201918.<\/a><\/p>\n<p>Want to share your cybersecurity knowledge with like-minded professionals at Ignite \u201918? <a href=\"https:\/\/ignite.paloaltonetworks.com\/callforpapers.html\">The call for papers is open and accepting submissions<\/a>. Get yours in before the February 12 deadline.<\/p>\n<p>Take a look at <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>.<\/p>\n<p>Looking to meet up with other Palo Alto Networks users? Check out <a href=\"https:\/\/www.fuelusergroup.org\/page\/spark-events\" rel=\"nofollow,noopener\" >Fuel, the Palo Alto Networks User Group<\/a>, for opportunities to attend hands-on workshops, events and more!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/286145\">Virtual Ultimate Test Drive - Network Security Management<\/a><\/p>\n<ul>\n<li>January 29, 2018<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/312664\">Palo Alto Networks Platform and Threat Intelligence Tools Webinar<\/a><\/p>\n<ul>\n<li>January 29, 2018<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/311431\">Traps in Real Life<\/a><\/p>\n<ul>\n<li>January 30, 2018<\/li>\n<li>Toronto, Canada<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/307170\">Quick Start Training - Threat Prevention<\/a><\/p>\n<ul>\n<li>January 30, 2018<\/li>\n<li>Portland, OR<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/286146\">Virtual Ultimate Test Drive - Advanced Endpoint Protection<\/a><\/p>\n<ul>\n<li>January 30, 2018<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/304964\">Top 10 public cloud security recommendations<\/a><\/p>\n<ul>\n<li>January 30, 2018<\/li>\n<li>Canberra, Australia<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/306543\">Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>January 31, 2018<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/308216\">Panorama Best Practices<\/a><\/p>\n<ul>\n<li>January 31, 2018<\/li>\n<li>Tustin, CA<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Catch up on the latest Palo Alto Networks news. <\/p>\n","protected":false},"author":153,"featured_media":44589,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[1691,5284,403,1819,5230,191,3627,3125,586],"coauthors":[1515],"class_list":["post-59842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-davos","tag-epic-cloud","tag-events-2","tag-ignite","tag-magnifier","tag-mark-mclaughlin","tag-oilrig","tag-threat-brief","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/09\/Linkedin-520x320-v1-2.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/59842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=59842"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/59842\/revisions"}],"predecessor-version":[{"id":59854,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/59842\/revisions\/59854"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/44589"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=59842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=59842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=59842"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=59842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}