{"id":6714,"date":"2014-09-12T17:00:15","date_gmt":"2014-09-13T00:00:15","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6714"},"modified":"2021-03-22T08:44:13","modified_gmt":"2021-03-22T15:44:13","slug":"palo-alto-networks-news-week-september-12","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/09\/palo-alto-networks-news-week-september-12\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 September 12"},"content":{"rendered":"<p>Interested in this week\u2019s top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\">Palo Alto Networks news<\/a>? It\u2019s all right here.<\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks and Fortinet welcomed Symantec and McAfee as co-founders of the industry\u2019s first Cyber Threat Alliance \u2013 a coordinated effort to share threat intelligence to better protect our respective internal enterprises and to help our customers do the same. <a href=\"http:\/\/bit.ly\/1ogCLex\" target=\"_blank\" rel=\"noopener\">Rick Howard explains why this is so important<\/a>.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"220\"><span class=\"ar-custom\" style=\"padding-bottom:27.27%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6715 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cyber-threat-alliance-logo.jpg\" alt=\"cyber threat alliance logo\" width=\"220\" height=\"60\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cyber-threat-alliance-logo.jpg 220w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cyber-threat-alliance-logo-146x40.jpg 146w\" sizes=\"auto, (max-width: 220px) 100vw, 220px\" \/><\/span><\/div><\/center><!--more--><\/p>\n<p><span style=\"color: #000000;\">Palo Alto Networks Unit 42 found and analyzed <a href=\"http:\/\/bit.ly\/1qQ1Bpe\" target=\"_blank\" rel=\"noopener\">a new iOS malware, AppBuyer<\/a>, affecting jailbroken iOS devices in the wild.\u00a0<\/span><\/p>\n<p><a href=\"http:\/\/bit.ly\/1oZr3V7\" target=\"_blank\" rel=\"noopener\">A Look Back At Our APAC and Japan NextWave Conference<\/a>: From the welcome reception Wednesday evening to the heartfelt goodbyes on Friday afternoon, our NextWave partners made the conference our most successful yet in the region.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"483\"><span class=\"ar-custom\" style=\"padding-bottom:50.93%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-4920 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg\" alt=\"NextWave logo-final\" width=\"483\" height=\"246\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg 483w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-230x117.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-78x40.jpeg 78w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/span><\/div><\/p>\n<p>Palo Alto Networks researcher Bo Qu identified <a href=\"http:\/\/bit.ly\/Yui6hF\" target=\"_blank\" rel=\"noopener\">15 new critical Internet Explorer vulnerabilities<\/a> covering IE versions 6, 7, 8, 9, 10 and 11.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"175\"><span class=\"ar-custom\" style=\"padding-bottom:105.71%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-5858 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/internet-explorer.jpg\" alt=\"internet explorer\" width=\"175\" height=\"185\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/internet-explorer.jpg 218w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/internet-explorer-37x40.jpg 37w\" sizes=\"auto, (max-width: 175px) 100vw, 175px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>We received a <a href=\"http:\/\/bit.ly\/1p3leWF\" target=\"_blank\" rel=\"noopener\">U.S. Gold \u201c<\/a><a href=\"http:\/\/bit.ly\/1p3leWF\" target=\"_blank\" rel=\"noopener\">Rising Star<\/a><a href=\"http:\/\/bit.ly\/1p3leWF\" target=\"_blank\" rel=\"noopener\">\u201d award<\/a>, presented by the Global Technology Distribution Council (GTDC), recognizing tech companies for exceptional regional sales growth over the past year through their distribution partners, and are one of only 12 overall U.S. winners.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"234\"><span class=\"ar-custom\" style=\"padding-bottom:42.74%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6661 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/GTDC-Logo.jpg\" alt=\"GTDC-Logo\" width=\"234\" height=\"100\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/GTDC-Logo.jpg 234w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/GTDC-Logo-230x98.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/GTDC-Logo-93x40.jpg 93w\" sizes=\"auto, (max-width: 234px) 100vw, 234px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p><a href=\"http:\/\/bit.ly\/1xJFV4r\" target=\"_blank\" rel=\"noopener\">This guest post<\/a> by Tim Haight, Owner, Knowetic Solutions, LC shares the importance of process in your Security Operations Center.<\/p>\n<p>Hot off the Press: Check out our <a href=\"http:\/\/bit.ly\/1ulZ6gC\" target=\"_blank\" rel=\"noopener\">new GlobalProtect Agent User Guide<\/a>!<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:38%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6674 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/globalprotect-agent-user-guide-500x190.png\" alt=\"globalprotect-agent-user-guide\" width=\"500\" height=\"190\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/globalprotect-agent-user-guide-500x190.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/globalprotect-agent-user-guide-230x87.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/globalprotect-agent-user-guide-510x194.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/globalprotect-agent-user-guide-104x40.png 104w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/globalprotect-agent-user-guide.png 600w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks president and CEO Mark McLaughlin appeared on <a href=\"http:\/\/bit.ly\/1lXCCBe\" target=\"_blank\" rel=\"noopener\">CNBC\u2019s Mad Money with Jim Cramer<\/a> this week to discuss our most recent quarter and prospects for the coming year.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:46.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6691 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Mark-Mad-Money-screenshot-9-10-14-500x234.png\" alt=\"Mark Mad Money screenshot 9 10 14\" width=\"500\" height=\"234\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Mark-Mad-Money-screenshot-9-10-14-500x234.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Mark-Mad-Money-screenshot-9-10-14-230x107.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Mark-Mad-Money-screenshot-9-10-14-510x238.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Mark-Mad-Money-screenshot-9-10-14-85x40.png 85w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Mark-Mad-Money-screenshot-9-10-14.png 564w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Congratulations to our <a href=\"http:\/\/bit.ly\/1tNFtPT\" target=\"_blank\" rel=\"noopener\">PA-7050 Picture It winners for August 2014<\/a> - Michael and Antonio!<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6684 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/7050-1-500x375.jpg\" alt=\"7050 (1)\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/7050-1-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/7050-1-230x172.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/7050-1-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/7050-1-53x40.jpg 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/7050-1.jpg 1024w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:133.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6685 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/foto_Antonio-Masalajpg.jpg\" alt=\"foto_Antonio Masalajpg\" width=\"500\" height=\"667\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/foto_Antonio-Masalajpg.jpg 480w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/foto_Antonio-Masalajpg-230x306.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/foto_Antonio-Masalajpg-225x300.jpg 225w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/foto_Antonio-Masalajpg-30x40.jpg 30w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Rock the vote - there is still time to <a href=\"http:\/\/bit.ly\/1nWZew5\" target=\"_blank\" rel=\"noopener\">vote for Palo Alto Networks<\/a> in the 2014 Computing Security Awards!<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:31.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6428 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227.png\" alt=\"EBA6A446-C190-439C-9DFB-A5B9FA842532[27]\" width=\"500\" height=\"158\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227.png 406w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227-230x72.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227-126x40.png 126w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ1OA==\" target=\"_blank\" rel=\"noopener\">Geli\u015fmi\u015f \u0130nat\u00e7\u0131 Tehditlere Kar\u015f\u0131 Kurumsal Bir G\u00fcvenlik Yakla\u015f\u0131m\u0131<\/a> [Turkish]<\/p>\n<ul>\n<li>When: September 16, 2014 from 10:00 AM - 11:00 AM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM1MQ==\" target=\"_blank\" rel=\"noopener\">NATO Cyber Security Symposium<\/a><\/p>\n<ul>\n<li>When: September 16-18, 2014 from 9:30 AM - 6:30 PM CET<\/li>\n<li>Where: Mons, Belgium<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ1OQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks ile APT'lere Kar\u015f\u0131 M\u00fccadele Edin<\/a> [Turkish]<\/p>\n<ul>\n<li>When: September 16, 2014 from 9:00 AM - 12:00 PM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM5OA==\" target=\"_blank\" rel=\"noopener\">Academic Freedom or Application Chaos?<\/a><\/p>\n<ul>\n<li>When: September 17, 2014 from 8:30 AM - 10:30 AM EST<\/li>\n<li>Where: Islandia, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM5Nw==\" target=\"_blank\" rel=\"noopener\">Defending Industrial Control Systems Against Cyberthreats<\/a><\/p>\n<ul>\n<li>When: September 17, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMxOQ==\" target=\"_blank\" rel=\"noopener\">Kustannustehokas uhkien torjunta<\/a> [Finnish]<\/p>\n<ul>\n<li>When: September 17, 2014 from 1:00 PM - 2:00 PM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM2Mw==\" target=\"_blank\" rel=\"noopener\">Opplev styrken i Next-Generation Brannmurer<\/a> [Norwegian]<\/p>\n<ul>\n<li>When: September 17, 2014 from 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQwNg==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: September 17, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQyNA==\" target=\"_blank\" rel=\"noopener\">Rethinking Mobile Security<\/a><\/p>\n<ul>\n<li>When: September 17, 2014 from 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM1NA==\" target=\"_blank\" rel=\"noopener\">The New Hospital<\/a><\/p>\n<ul>\n<li>When: September 17, 2014 from 8:00 AM - 2:30 PM CET<\/li>\n<li>Where: Ghent<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM3MA==\" target=\"_blank\" rel=\"noopener\">Online Demo: oplev vores N\u00e6ste Generations Firewall\u2019s r\u00e5 kraft<\/a> [Danish]<\/p>\n<ul>\n<li>When: September 18, 2014 from 2:00 PM - 3:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQzNQ==\" target=\"_blank\" rel=\"noopener\">Rethinking Mobile Security<\/a><\/p>\n<ul>\n<li>When: September 23, 2014 from 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ1MQ==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Melbourne<\/a><\/p>\n<ul>\n<li>When: September 23, 2014 from 9:00 AM - 12:30 PM GMT+10:00<\/li>\n<li>Where: Melbourne<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMyMg==\" target=\"_blank\" rel=\"noopener\">Demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva tarkoittaa k\u00e4yt\u00e4nn\u00f6ss\u00e4<\/a> [Finnish]<\/p>\n<ul>\n<li>When: September 24, 2014 from 1:00 PM - 2:00 PM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMwNw==\" target=\"_blank\" rel=\"noopener\">Get Your Network up to Speed<\/a><\/p>\n<ul>\n<li>When: September 24, 2014 from 10:30 AM - 2:30 PM EST<\/li>\n<li>Where: Jessup, MD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTgxNw==\" target=\"_blank\" rel=\"noopener\">Next Generation Security Technical Workshop<\/a><\/p>\n<ul>\n<li>When: September 24, 2014 from 10:00 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQyMw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks T\u00fcrkiye I\u015f Orta\u011f\u0131 Semineri<\/a> [Turkish]<\/p>\n<ul>\n<li>When: September 24, 2014 from 9:30 AM - 5:00 PM EET<\/li>\n<li>Where: Istabnul<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQzNA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Ultimate Test Drive<\/a> [Spanish]<\/p>\n<ul>\n<li>When: September 24, 2014 from 8:00 AM - 1:00 PM CST<\/li>\n<li>Where: San Pedro Garza Garc\u00eda<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQyOQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: September 24, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQzNg==\" target=\"_blank\" rel=\"noopener\">Reducing Cyberrisk in Industrial Control Systems with Advanced Network<\/a><\/p>\n<ul>\n<li>When: September 24, 2014 from 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQyNQ==\" target=\"_blank\" rel=\"noopener\">Registreer nu voor een Live Demo - Ontdek de kracht van de Enterprise<\/a> [Dutch]<\/p>\n<ul>\n<li>When: September 24, 2014 from 1:00 PM - 2:00 PM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ0OQ==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Sydney<\/a><\/p>\n<ul>\n<li>When: September 24, 2014 from 9:00 AM - 12:30 PM GMT+10:00<\/li>\n<li>Where: Sydney<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMxMg==\" target=\"_blank\" rel=\"noopener\">Bright &amp; Cloudy 2014<\/a> [Dutch]<\/p>\n<ul>\n<li>When: September 25, 2014 from 9:00 AM - 5:00 PM CET<\/li>\n<li>Where: Utrecht<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ2MQ==\" target=\"_blank\" rel=\"noopener\">Hiding in Plain Sight: What\u2019s Really Happening on Your Network<\/a><\/p>\n<ul>\n<li>When: September 25, 2014 from 10:00 AM - 11:00 AM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM5OQ==\" target=\"_blank\" rel=\"noopener\">What's brewing in network security?<\/a><\/p>\n<ul>\n<li>When: September 25, 2014 from 3:00 PM - 6:00 PM EST<\/li>\n<li>Where: Natick, MA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ0Mw==\" target=\"_blank\" rel=\"noopener\">\u5b89\u5168\u79d8\u7b08\uff1aICS\/SCADA\u7cfb\u7edf\u7f51\u7edc\u98ce\u9669\u7edf\u4e00\u7ba1\u7406\u5e73\u53f0<\/a>\u00a0[Chinese]<\/p>\n<ul>\n<li>When: September 25, 2014 from 10:30 AM - 11:30 AM GMT+8:00<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Interested in this week\u2019s top Palo Alto Networks news? It\u2019s all right here. &nbsp; Palo Alto Networks and Fortinet welcomed Symantec and McAfee as co-founders of the industry\u2019s first Cyber Threat Alliance &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[621,662,671,100,199,355,542,684,673],"coauthors":[709],"class_list":["post-6714","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-computing-security-awards","tag-cyber-threat-alliance","tag-global-technology-distribution-council","tag-globalprotect","tag-mad-money","tag-nextwave","tag-picture-it","tag-rising-star","tag-security-operations-center"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6714"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6714\/revisions"}],"predecessor-version":[{"id":128790,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6714\/revisions\/128790"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6714"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}