{"id":61210,"date":"2018-02-03T04:00:07","date_gmt":"2018-02-03T12:00:07","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=61210"},"modified":"2018-02-02T12:33:45","modified_gmt":"2018-02-02T20:33:45","slug":"palo-alto-networks-news-week-february-3-2018","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/02\/palo-alto-networks-news-week-february-3-2018\/","title":{"rendered":"Palo Alto Networks News of the Week: February 3, 2018"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry \u2013 we\u2019ve rounded up our top news and views right here:<\/p>\n<ul>\n<li>Join us for the biggest cloud security event of the year! Hosted by <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/epic-cloud-security-event-welcome-salim-ismail\/\">Salim Ismail<\/a>, best-selling author, futurist and technology entrepreneur, THE EPIC CLOUD SECURITY EVENT will feature A-list cloud experts and our own chief product officer, Lee Klarich.\u00a0<a href=\"http:\/\/go.paloaltonetworks.com\/epiccloud\"><strong>Register now for The Epic Cloud Security Event<\/strong><\/a><\/li>\n<\/ul>\n<p style=\"text-align: center;\"><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"lKo0EaLecbo\" ><\/lite-youtube><\/div><\/p>\n<ul>\n<li>Unit 42 shared new research:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/unit42-vermin-quasar-rat-custom-malware-used-ukraine\/\">VERMIN: Quasar RAT and Custom Malware Used In Ukraine<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/unit42-comnie-continues-target-organizations-east-asia\/\">Comnie Continues to Target Organizations in East Asia<\/a><\/li>\n<\/ul>\n<\/li>\n<li>The fourth of our five critical mistakes to avoid when purchasing a NGFW is <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/5-critical-mistakes-avoid-not-accounting-ease-integration-scalability\/\">not accounting for ease of integration and scalability<\/a>.<\/li>\n<li>Connect with <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/connect-cybersecurity-experts-tcea\/\">cybersecurity experts from Palo Alto Networks at the TCEA conference<\/a> in Austin, Texas.<\/li>\n<li>The Cybersecurity Canon reviewed two popular cybersecurity books\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/cybersecurity-canon-american-kingpin-epic-hunt-criminal-mastermind-behind-silk-road\/\">American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/02\/cybersecurity-canon-practical-malware-analysis-hands-guide-dissecting-malicious-software\/\">Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: left;\">\n<p>Take a look at <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><a href=\" https:\/\/ignite.paloaltonetworks.com\/usa?CampaignId=7010g000001IH8U&amp;utm_content=Ignite18USA&amp;utm_medium=SocailMedia&amp;utm_source=twitter\"><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:41.67%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-54450 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/12\/ignite18-blog.jpg\" alt=\"ignite18-blog\" width=\"600\" height=\"250\" \/><\/span><\/div><\/a><\/p>\n<p>Secure your spot at the cybersecurity conference of the year. <a href=\"https:\/\/ignite.paloaltonetworks.com\/usa?CampaignId=7010g000001IH8U&amp;utm_content=Ignite18USA&amp;utm_medium=SocailMedia&amp;utm_source=ResourceCenter\">Register now for Ignite \u201918.<\/a><\/p>\n<p>Want to share your cybersecurity knowledge with like-minded professionals at Ignite \u201918? <a href=\"https:\/\/ignite.paloaltonetworks.com\/callforpapers.html\">The call for papers is open and accepting submissions<\/a>. Get yours in before the February 12 deadline.<\/p>\n<p>Looking to meet up with other Palo Alto Networks users? Check out <a href=\"https:\/\/www.fuelusergroup.org\/page\/spark-events\" rel=\"nofollow,noopener\" >Fuel, the Palo Alto Networks User Group<\/a>, for opportunities to attend hands-on workshops, events and more!<\/p>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/epiccloud\">The Epic Cloud Security Event<\/a><\/p>\n<ul>\n<li>February 6, 2018<\/li>\n<li>Online and a location near you!<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/307970\">VM Series for AWS w\/ Capgemini<\/a><\/p>\n<ul>\n<li>February 6, 2018<\/li>\n<li>Toronto, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/309480\">Virtual Ultimate Test Drive - Virtualized Data Center<\/a><\/p>\n<ul>\n<li>February 6, 2018<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/309490\">Virtual Ultimate Test Drive - Network Security Management<\/a><\/p>\n<ul>\n<li>February 8, 2018<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/305324\">Secure Clouds Are Happy Clouds<\/a><\/p>\n<ul>\n<li>February 8, 2018<\/li>\n<li>Minneapolis, MN<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Dive into the top Palo Alto Networks news of the week. <\/p>\n","protected":false},"author":153,"featured_media":45207,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[251,5284,403,5103,111,586,5028],"coauthors":[1515],"class_list":["post-61210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-cybersecurity-canon","tag-epic-cloud","tag-events-2","tag-ignite-18","tag-ngfw","tag-unit-42","tag-vermin"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/10\/Linkedin-520x320-v1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/61210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=61210"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/61210\/revisions"}],"predecessor-version":[{"id":61219,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/61210\/revisions\/61219"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/45207"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=61210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=61210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=61210"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=61210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}