{"id":6852,"date":"2014-09-27T06:00:18","date_gmt":"2014-09-27T13:00:18","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6852"},"modified":"2015-12-08T16:46:34","modified_gmt":"2015-12-09T00:46:34","slug":"palo-alto-networks-news-week-september-27","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/09\/palo-alto-networks-news-week-september-27\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 September 27"},"content":{"rendered":"<p>Here is this week\u2019s top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\">Palo Alto Networks news<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks <a href=\"http:\/\/bit.ly\/1Co2oCS\" rel=\"nofollow,noopener\"  target=\"_blank\">addresses<\/a> Bash vulnerability Shellshock.<!--more--><\/p>\n<p>Today, legacy and stagnant vendors continue to propagate an idea that 15-year-old technology provides protection. Tim Treat <a href=\"http:\/\/bit.ly\/1v5MvxE\" rel=\"nofollow,noopener\"  target=\"_blank\">explores the question<\/a>: With every new breach and subsequent headline, will we finally see C-level executives push back?<\/p>\n<p>This week at the 2014 Virus Bulletin International Conference in Seattle, Palo Alto Networks presented a paper entitled \u201cWe Know It Before You Do: Predicting Malicious Domains.\u201d Unit 42 is excited to <a href=\"http:\/\/bit.ly\/1xhV9fN\" rel=\"nofollow,noopener\"  target=\"_blank\">share the key points of the paper and presentation here<\/a> for everyone who couldn\u2019t see it in person. And for more, check out <a href=\"http:\/\/threatpost.com\/researchers-work-to-predict-malicious-domains\/108531\" rel=\"nofollow,noopener\"  target=\"_blank\">this article<\/a> from Threatpost.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"300\"><span class=\"ar-custom\" style=\"padding-bottom:49%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6810 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/VB2014-dates-web.jpg\" alt=\"VB2014-dates-web\" width=\"300\" height=\"147\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/VB2014-dates-web.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/VB2014-dates-web-230x112.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/VB2014-dates-web-81x40.jpg 81w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Each quarter we like to share recent channel updates with the NextWave partner community through our VideoWave series. <a href=\"http:\/\/bit.ly\/1rnqFW5\" rel=\"nofollow,noopener\"  target=\"_blank\">In this quarter's video<\/a>, Ron Myers discusses our channel priorities in FY15.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:56%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6790 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-23-at-3.45.06-PM-500x280.png\" alt=\"Screen Shot 2014-09-23 at 3.45.06 PM\" width=\"500\" height=\"280\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-23-at-3.45.06-PM-500x280.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-23-at-3.45.06-PM-230x128.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-23-at-3.45.06-PM-510x285.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-23-at-3.45.06-PM-71x40.png 71w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-23-at-3.45.06-PM.png 799w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks will be onsite at next week\u2019s <a href=\"http:\/\/bit.ly\/1t0fq2J\" rel=\"nofollow,noopener\"  target=\"_blank\">NASCIO Annual Conference<\/a> in Nashville, Tennessee, and we\u2019d love to see you there.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:25.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6829 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/NASCIO-500x129.png\" alt=\"NASCIO\" width=\"500\" height=\"129\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/NASCIO-500x129.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/NASCIO-230x59.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/NASCIO-510x132.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/NASCIO-154x40.png 154w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/NASCIO.png 1000w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Can you picture yourself with an iPad Mini? The chance to win one may be easier than you think \u2013 you just have to take a picture of your own first. <a href=\"http:\/\/bit.ly\/Zf8hEz\" rel=\"nofollow,noopener\"  target=\"_blank\">Find out more here<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"480\"><span class=\"ar-custom\" style=\"padding-bottom:133.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6833 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/sept-reminder-post.jpg\" alt=\"sept reminder post\" width=\"480\" height=\"640\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/sept-reminder-post.jpg 480w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/sept-reminder-post-230x306.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/sept-reminder-post-225x300.jpg 225w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/sept-reminder-post-30x40.jpg 30w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Thank you to all of our NextWave partners who attended last week\u2019s Americas Partner Conference in Chicago. It was a record-breaking year for Palo Alto Networks and it was inspiring to connect with our top partners from the U.S., Canada and Latin America to set the stage for the next 12 months. <a href=\"http:\/\/bit.ly\/XQ2QKG\" rel=\"nofollow,noopener\"  target=\"_blank\">Check out this video for a look at the event<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"483\"><span class=\"ar-custom\" style=\"padding-bottom:50.93%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-4920 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg\" alt=\"NextWave logo-final\" width=\"483\" height=\"246\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg 483w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-230x117.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-78x40.jpeg 78w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Only a few more days to <a href=\"http:\/\/bit.ly\/1nWZew5\" rel=\"nofollow,noopener\"  target=\"_blank\">vote for Palo Alto Networks<\/a> in the 2014 Computing Security Awards! Voting ends September 30.<\/p>\n<p><a href=\"http:\/\/www.storagemagazine.co.uk\/CS\/CSAwards\/?page=palo-csa2014vote\" rel=\"nofollow,noopener\" ><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:31.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6428 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227.png\" alt=\"EBA6A446-C190-439C-9DFB-A5B9FA842532[27]\" width=\"500\" height=\"158\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227.png 406w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227-230x72.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227-126x40.png 126w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>If you are responsible for network operations, network architecture, cybersecurity, information security, or compliance at a financial institution, <a href=\"http:\/\/bit.ly\/1uyxeE1\" rel=\"nofollow,noopener\"  target=\"_blank\">join us on September 30 for an interactive online event<\/a> on the topic of network segmentation for financial services, organized in partnership between Palo Alto Networks and the SANS Institute.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"122\"><span class=\"ar-custom\" style=\"padding-bottom:63.93%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5368 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Sans.png\" alt=\"Sans\" width=\"122\" height=\"78\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Sans.png 122w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Sans-62x40.png 62w\" sizes=\"auto, (max-width: 122px) 100vw, 122px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Hear our CSO Rick Howard &amp; CIO Robert Quinn discuss \u201c<a href=\"http:\/\/bit.ly\/1nRaP14\" rel=\"nofollow,noopener\"  target=\"_blank\">CIO &amp; CSO in the C-Suite: Where Do They Belong?<\/a>\u201d at the Cyber Security EXPO in London on October 8.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6710 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cybersec-expo.png\" alt=\"cybersec expo\" width=\"500\" height=\"63\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cybersec-expo.png 332w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cybersec-expo-230x29.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cybersec-expo-240x30.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks will be on the scene at Black Hat Europe 2014 to explain how adversaries seek to infiltrate global organizations and how by combining threat intelligence with a next-generation enterprise security platform, organizations can detect and prevent advanced threats. <a href=\"http:\/\/bit.ly\/1wNHBFI\" rel=\"nofollow,noopener\"  target=\"_blank\">Here\u2019s how to find us while we\u2019re there<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:32.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6853 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-500x163.png\" alt=\"{8499b00d-3ac8-4c6a-a663-5fffffc1e1d7}_PAN_BH14-LP-banner-Europe_Oct2014\" width=\"500\" height=\"163\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-500x163.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-230x75.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-510x166.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-122x40.png 122w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014.png 1045w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks returns to <a href=\"http:\/\/bit.ly\/1ycnK7G\" rel=\"nofollow,noopener\"  target=\"_blank\">Infosecurity: The Netherlands<\/a> on October 29-30. Visit our booth to hear about threats hiding in plain sight on your network, plus additional important insights from our <a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\">2014 Application Usage and Threat Report<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:26.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6736 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity.png\" alt=\"logo-infosecurity\" width=\"500\" height=\"133\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity.png 312w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity-230x61.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity-150x40.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQzMw==\" target=\"_blank\">Join the end point revolution with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: October 1, 2014 from 4:00 PM - 6:00 PM EST<\/li>\n<li>Where: Toronto, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM2NA==\" target=\"_blank\">Opplev styrken i Next-Generation Brannmurer<\/a> [Norwegian]<\/p>\n<ul>\n<li>When: October 1, 2014 from 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQzMA==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: October 1, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM0OA==\" target=\"_blank\">Securing Mobile Devices with the New GlobalProtect<\/a><\/p>\n<ul>\n<li>When: October 1, 2014 from 6:00 PM - 7:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ2Mw==\" target=\"_blank\">Migrating from Cisco ASA to Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: October 2, 2014 from 11:00 AM - 12:00 PM GMT+10:00<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM0OQ==\" target=\"_blank\">Securing Mobile Devices with the New GlobalProtect<\/a><\/p>\n<ul>\n<li>When: October 2, 2014 from 7:00 AM - 8:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM0Nw==\" target=\"_blank\">Securing Mobile Devices with the New GlobalProtect<\/a><\/p>\n<ul>\n<li>When: October 2, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ2NA==\" target=\"_blank\">Fuel<\/a><\/p>\n<ul>\n<li>When: October 7, 2014 from 4:00 PM - 6:00 PM GMT+8:00<\/li>\n<li>Where: Brisbane, NSW<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQyNg==\" target=\"_blank\">Palo Alto Networks Public Sector Expert Forum!<\/a><\/p>\n<ul>\n<li>When: October 7, 2014 from 8:30 AM - 12:30 PM EST<\/li>\n<li>Where: Toronto, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ5OA==\" target=\"_blank\">The Harsh Reality of Cyber Protection<\/a><\/p>\n<ul>\n<li>When: October 7, 2014 from 10:00 AM - 11:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM1OA==\" target=\"_blank\">Palo Alto Networks at IP Expo 2014<\/a><\/p>\n<ul>\n<li>When: October 8, 2014 from 9:00 AM - 5:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUxMQ==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: October 8, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUwOA==\" target=\"_blank\">Security Compliance with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: October 8, 2014 from 10:00 AM - 11:00 AM CST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here is this week\u2019s top Palo Alto Networks news. &nbsp; &nbsp; Palo Alto Networks addresses Bash vulnerability Shellshock.<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[190,621,759,355,542,752,769,495,768],"coauthors":[709],"class_list":["post-6852","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-americas-partner-conference","tag-computing-security-awards","tag-nascio","tag-nextwave","tag-picture-it","tag-shellshock","tag-threatpost","tag-videowave","tag-virus-bulletin"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6852"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6852\/revisions"}],"predecessor-version":[{"id":11313,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6852\/revisions\/11313"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6852"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}