{"id":6274,"date":"2014-08-01T09:00:31","date_gmt":"2014-08-01T16:00:31","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6274"},"modified":"2021-03-22T08:33:15","modified_gmt":"2021-03-22T15:33:15","slug":"palo-alto-networks-news-week-august-1","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/08\/palo-alto-networks-news-week-august-1\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 August 1"},"content":{"rendered":"<p>Here\u2019s a roundup of top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a> from the last week in July.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/connect.paloaltonetworks.com\/adversary-report\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6200 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/419-evolution-500x166.png\" alt=\"419 evolution unit 42\" width=\"500\" height=\"166\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/419-evolution-500x166.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/419-evolution-230x76.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/419-evolution-510x170.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/419-evolution-119x40.png 119w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/419-evolution.png 537w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Black Hat USA 2014 kicks off next week, and at the conference you\u2019ll have the chance to meet team leads from Unit 42, our threat intelligence team. They will be available to take your questions and talk about our intelligence process. <a href=\"http:\/\/bit.ly\/1qaoEJB\" target=\"_blank\" rel=\"noopener\">Here\u2019s where you can find them<\/a>.<!--more--><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:53.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6140 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo-500x269.png\" alt=\"logo\" width=\"500\" height=\"269\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo-500x269.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo-230x123.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo-510x274.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo-74x40.png 74w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo.png 522w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>At Palo Alto Networks, we have a passion for innovation \u2014 and it extends out to documentation! To that end, we present the new look for our Technical Documentation site. <a href=\"http:\/\/bit.ly\/X4RcvL\" target=\"_blank\" rel=\"noopener\">Check out some of the new features<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6253 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/search-filters-ex-500x379.png\" alt=\"search-filters-ex\" width=\"500\" height=\"379\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/search-filters-ex-500x379.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/search-filters-ex-230x174.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/search-filters-ex-395x300.png 395w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/search-filters-ex-52x40.png 52w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/search-filters-ex.png 1200w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>As we get ready to announce details of Ignite 2015, we\u2019re also taking a look back at this year\u2019s Ignite conference. In this Ignite 2014 talk, Lee Klarich <a href=\"http:\/\/bit.ly\/ULMCk6\" target=\"_blank\" rel=\"noopener\">discussed<\/a>\u00a0the Palo Alto Networks platform approach and urged security practitioners to move beyond a detection mindset.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:55.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6275 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/lee-klarich.png\" alt=\"lee klarich\" width=\"500\" height=\"277\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/lee-klarich.png 492w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/lee-klarich-230x127.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/lee-klarich-72x40.png 72w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Brian Tokuyoshi explains that the only way to safely enable mobile devices is to bring together three core requirements for mobile security: managing the device, protecting the device, and controlling the data. <a href=\"http:\/\/bit.ly\/UIUHGi\" target=\"_blank\" rel=\"noopener\">Find out how this is accomplished using GlobalProtect<\/a>.<\/p>\n<p>Palo Alto Networks is now featured on Zoom, the federal IT leadership blog of MeriTalk. <a href=\"http:\/\/bit.ly\/1tnQyXx\" target=\"_blank\" rel=\"noopener\">Check it out<\/a>, and while you\u2019re there, take a look at how we provide cybersecurity to the U.S. Government for all network zones and data centers.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"205\"><span class=\"ar-custom\" style=\"padding-bottom:33.17%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6262 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/zoom-logo.jpg\" alt=\"zoom-logo\" width=\"205\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/zoom-logo.jpg 205w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/zoom-logo-120x40.jpg 120w\" sizes=\"auto, (max-width: 205px) 100vw, 205px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA2NQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Evening<\/a> [Italian]<\/p>\n<ul>\n<li>When: August 4, 2014 from 4:30 PM - 8:00 PM CET<\/li>\n<li>Where: Brianza<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI5Mw==\" target=\"_blank\" rel=\"noopener\">Black Hat USA 2014<\/a><\/p>\n<ul>\n<li>When: August 6-7, 2014 from 10:00 AM - 7:00 PM PST<\/li>\n<li>Where: Las Vegas, NV<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMyNg==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: August 6, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMxMw==\" target=\"_blank\" rel=\"noopener\">Secure Your Network - Practical Advice from Market Leaders<\/a><\/p>\n<ul>\n<li>When: August 7, 2014 from 5:30 PM - 7:30 PM EST<\/li>\n<li>Where: Lynnfield, MA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMyNw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: August 13, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMzOA==\" target=\"_blank\" rel=\"noopener\">Take the Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: August 13, 2014 from 7:30 AM - 1:30 PM EST<\/li>\n<li>Where: Richmond, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMxNw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Next-Generation Security - Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: August 14, 2014 from 10:00 AM - 3:00 PM EST<\/li>\n<li>Where: Wayne, PA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMzNg==\" target=\"_blank\" rel=\"noopener\">Tech on Tap Event<\/a><\/p>\n<ul>\n<li>When: August 14, 2014 from 5:00 PM - 7:00 PM EST<\/li>\n<li>Where: Ashland, VA<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a roundup of top Palo Alto Networks news from the last week in July. &nbsp; &nbsp; Black Hat USA 2014 kicks off next week, and at the conference you\u2019ll have the &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,99,203,108],"tags":[581,100,589,1824,588],"coauthors":[709],"class_list":["post-6274","post","type-post","status-publish","format-standard","hentry","category-events","category-ignite","category-news-of-the-week","category-threat-prevention-2","tag-419-evolution","tag-globalprotect","tag-meritalk","tag-technical-documentation","tag-zoom"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6274"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6274\/revisions"}],"predecessor-version":[{"id":128778,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6274\/revisions\/128778"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6274"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}