{"id":6570,"date":"2014-08-29T16:20:04","date_gmt":"2014-08-29T23:20:04","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6570"},"modified":"2021-03-22T08:41:40","modified_gmt":"2021-03-22T15:41:40","slug":"palo-alto-networks-news-week-august-29","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/08\/palo-alto-networks-news-week-august-29\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 August 29"},"content":{"rendered":"<p>Here\u2019s a roundup of this week\u2019s top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Following a recent study of apps in the Google Play Store, <a href=\"http:\/\/bit.ly\/1pmtpTK\" target=\"_blank\" rel=\"noopener\">Unit 42 discusses several security risks caused by the bad certificate management practiced in many Android apps<\/a>, from social to mobile banking.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:84.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6560 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/figure-1_google-play-500x424.png\" alt=\"figure 1_google play\" width=\"500\" height=\"424\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/figure-1_google-play-500x424.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/figure-1_google-play-230x195.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/figure-1_google-play-353x300.png 353w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/figure-1_google-play-47x40.png 47w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/figure-1_google-play.png 1016w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><!--more--><\/p>\n<p>As part of Unit 42\u2019s mission to contribute to the security community, they developed and released a version of the NetWire decryption tool that works within ChopShop. <a href=\"http:\/\/bit.ly\/1oZuDEh\" target=\"_blank\" rel=\"noopener\">Learn how to use the tool<\/a>.<\/p>\n<p>We laid the foundation for our partner pay for performance profitability approach in our latest NextWave Partner Program news. <a href=\"http:\/\/bit.ly\/1olCaaz\" target=\"_blank\" rel=\"noopener\">Find out more<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:51%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-4920 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg\" alt=\"NextWave logo-final\" width=\"500\" height=\"255\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg 483w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-230x117.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-78x40.jpeg 78w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><a href=\"http:\/\/bit.ly\/1vfgBB9\" target=\"_blank\" rel=\"noopener\">Check out our paper and Rick Howard's article<\/a> to help governments develop a structured approach to their Security Operations Centers (SOC).<\/p>\n<p>The summer may be drawing to a close, but you still have a few more days to <a href=\"http:\/\/bit.ly\/1lcoHai\" target=\"_blank\" rel=\"noopener\">enter the August Picture It contest<\/a>. Submitted already? Great! Haven\u2019t submitted yet? What are you waiting for?<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6537 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/4.29_EMEA_Netherlands_OlafHartong_ASP4All-500x500.jpg\" alt=\"Processed with Rookie\" width=\"500\" height=\"500\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/4.29_EMEA_Netherlands_OlafHartong_ASP4All-500x500.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/4.29_EMEA_Netherlands_OlafHartong_ASP4All-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/4.29_EMEA_Netherlands_OlafHartong_ASP4All-230x230.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/4.29_EMEA_Netherlands_OlafHartong_ASP4All-300x300.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/4.29_EMEA_Netherlands_OlafHartong_ASP4All-40x40.jpg 40w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Earlier this week Sharat Sinha, Vice President of APAC Sales, spoke with Channel NewsAsia in Singapore about the significance of hacktivism and continuing challenges with cybersecurity in the region. <a href=\"http:\/\/bit.ly\/1tKBbq5\" target=\"_blank\" rel=\"noopener\">Watch here<\/a>.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"305\"><span class=\"ar-custom\" style=\"padding-bottom:74.75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6571 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/sharat_singapore-video.png\" alt=\"sharat_singapore video\" width=\"305\" height=\"228\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/sharat_singapore-video.png 305w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/sharat_singapore-video-230x171.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/sharat_singapore-video-53x40.png 53w\" sizes=\"auto, (max-width: 305px) 100vw, 305px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>In recent months, a new narrative has taken shape on the Internet of Things. Instead of thinking about how to protect against an attack on a network connected device, what can we do about the network connected devices that are doing the attacking? <a href=\"http:\/\/bit.ly\/1u1HrsP\u00a0\" target=\"_blank\" rel=\"noopener\">Brian Tokuyoshi discusses that question here<\/a>.<\/p>\n<p>You can have it all: data center security without compromise. That was a big theme at VMworld 2014 this week in San Francisco. <a href=\"http:\/\/bit.ly\/1sCRBPx\" target=\"_blank\" rel=\"noopener\">Check out scenes from the conference<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:149.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6551 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/IMG_2265-500x749.png\" alt=\"IMG_2265\" width=\"500\" height=\"749\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/IMG_2265-500x749.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/IMG_2265-230x344.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/IMG_2265-200x300.png 200w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/IMG_2265-26x40.png 26w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/IMG_2265.png 977w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Given the rate of consolidation in healthcare \u2014 the year-to-date level of announced M&amp;A activity in the healthcare sector is at its highest since Thomson Reuters began tracking in 1980 \u2014 <a href=\"http:\/\/bit.ly\/VKHgGE\" target=\"_blank\" rel=\"noopener\">Isabelle Dumont shares the best security practices for healthcare providers throughout the integration process<\/a>.<\/p>\n<p>Max Barry's Lexicon isn't a fit for Cybersecurity Canon, but Rick Howard still recommends it as a good read. <a href=\"http:\/\/bit.ly\/VQLWue\" target=\"_blank\" rel=\"noopener\">Find out why<\/a>.<\/p>\n<p>There is still time to <a href=\"http:\/\/bit.ly\/1nWZew5\" target=\"_blank\" rel=\"noopener\">vote for Palo Alto Networks<\/a> in the 2014 Computing Security Awards.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:65.22%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6450 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg-230x150.jpg\" alt=\"Awards Logos finalist jpeg\" width=\"230\" height=\"150\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg-230x150.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg-500x326.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg-459x300.jpg 459w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg-61x40.jpg 61w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg.jpg 756w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM2Mg==\" target=\"_blank\" rel=\"noopener\">Opplev styrken i Next-Generation Brannmurer<\/a> [Norwegian]<\/p>\n<ul>\n<li>When: September 3, 2014 from 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQwNA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: September 3, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQyMw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks T\u00fcrkiye I\u015f Orta\u011f\u0131 Semineri<\/a> [Turkish]<\/p>\n<ul>\n<li>When: September 9, 2014 from 9:30 AM - 5:00 PM EET<\/li>\n<li>Where: Istanbul<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI3Ng==\" target=\"_blank\" rel=\"noopener\">Securing the Law Firm<\/a><\/p>\n<ul>\n<li>When: September 9, 2014 from 8:30 AM - 5:00 PM WET<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQwMg==\" target=\"_blank\" rel=\"noopener\">\u0422\u0415\u0421\u0422-\u0414\u0420\u0410\u0419\u0412 \u041c\u0415\u0416\u0421\u0415\u0422\u0415\u0412\u042b\u0425 \u042d\u041a\u0420\u0410\u041d\u041e\u0412 \u041d\u041e\u0412\u041e\u0413\u041e \u041f\u041e\u041a\u041e\u041b\u0415\u041d\u0418\u042f<\/a> [Russian]<\/p>\n<ul>\n<li>When: September 9, 2014 from 9:00 AM - 1:30 PM GMT+4:00<\/li>\n<li>Where: Moscow<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMyNA==\" target=\"_blank\" rel=\"noopener\">Eat, Drink, Network<\/a><\/p>\n<ul>\n<li>When: September 10, 2014 from 3:00 PM - 7:00 PM EST<\/li>\n<li>Where: Stratford, CT<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQwNQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: September 10, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a roundup of this week\u2019s top Palo Alto Networks news. &nbsp; Following a recent study of apps in the Google Play Store, Unit 42 discusses several security risks caused by the &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[621,251,168],"coauthors":[709],"class_list":["post-6570","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-computing-security-awards","tag-cybersecurity-canon","tag-vmworld"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6570"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6570\/revisions"}],"predecessor-version":[{"id":128787,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6570\/revisions\/128787"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6570"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}