{"id":6959,"date":"2014-10-04T04:00:41","date_gmt":"2014-10-04T11:00:41","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6959"},"modified":"2015-12-08T16:46:29","modified_gmt":"2015-12-09T00:46:29","slug":"palo-alto-networks-news-week-october-4","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/10\/palo-alto-networks-news-week-october-4\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 October 4"},"content":{"rendered":"<p>Here is this week\u2019s top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\">Palo Alto Networks news<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>We announced <a href=\"http:\/\/bit.ly\/1DSNkPw\" rel=\"nofollow,noopener\"  target=\"_blank\">Traps Advanced Endpoint Protection<\/a>, a revolutionary and unique offering designed to prevent sophisticated cyber attacks on endpoints.<\/p>\n<p>Learn more about Traps:<\/p>\n<ul>\n<li><a href=\"http:\/\/media.paloaltonetworks.com\/lp\/traps\/?referer=http%3A%2F%2Fblog.paloaltonetworks.com%2F2014%2F09%2Ftraps-advanced-endpoint-protection&amp;utm_medium=email&amp;utm_source=launch+campaign+activities\">Visit the Traps site<\/a> to see a product demo, the Traps data sheet and schedule a 1:1 to get a personal tour of this new technology.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1uzkAbF\" rel=\"nofollow,noopener\" >Watch these interviews<\/a> with Nir Zuk and Lee Klarich<\/li>\n<li><a href=\"http:\/\/bit.ly\/1teBOFu\" rel=\"nofollow,noopener\" >Hear from Golan Ben-Oni<\/a>, CSO &amp; SVP of Architecture for IDT Corporation &amp; <a href=\"http:\/\/bit.ly\/1uzkAbF\" rel=\"nofollow,noopener\" >Sebastian Goodwin<\/a>, former CISO for Robert Half International<\/li>\n<li><a href=\"http:\/\/bit.ly\/YIzqPa\" rel=\"nofollow,noopener\" >Watch this video<\/a> from our demonstrative Lightboard series<\/li>\n<\/ul>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:42%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6870 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/adv-endpoint-protection-500x210.png\" alt=\"adv endpoint protection\" width=\"500\" height=\"210\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/adv-endpoint-protection-500x210.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/adv-endpoint-protection-230x96.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/adv-endpoint-protection-510x214.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/adv-endpoint-protection-95x40.png 95w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/adv-endpoint-protection.png 756w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><!--more--><\/p>\n<p><a href=\"http:\/\/bit.ly\/1xLUB1T\" rel=\"nofollow,noopener\"  target=\"_blank\">Unit 42 uncovered<\/a> new indicators of compromise for APT group Nitro.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nitro_blog.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:35.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6953 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nitro_blog-500x177.png\" alt=\"nitro_blog\" width=\"500\" height=\"177\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nitro_blog-500x177.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nitro_blog-230x81.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nitro_blog-510x181.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nitro_blog-112x40.png 112w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nitro_blog.png 1932w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>In the information security tradition of turning things on their side and looking for interesting findings, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/09\/malware-trending-stun-awareness\/\" target=\"_blank\">this post from Unit 42<\/a> focuses on the misuse of STUN by malware and associated trending.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1rkkXpj\" rel=\"nofollow,noopener\"  target=\"_blank\">Check out this guest post from Rick Antonucci<\/a>, Market Intelligence Analyst from immixGroup, on how the summer of 2014 highlighted the need for better intrusion prevention and a platform approach.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/immixGroup_3D_4c-EPS-version-500x100.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:20%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6843 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/immixGroup_3D_4c-EPS-version-500x100.jpg\" alt=\"immixGroup_3D_4c-EPS-version-500x100\" width=\"500\" height=\"100\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/immixGroup_3D_4c-EPS-version-500x100.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/immixGroup_3D_4c-EPS-version-500x100-230x46.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/immixGroup_3D_4c-EPS-version-500x100-200x40.jpg 200w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Recently after some great feedback on his recent post, \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/09\/logs-yesterdays-news-need-know-whats-happening-now\/\" target=\"_blank\">Logs are Yesterday\u2019s News<\/a>,\u201d Tim <a href=\"http:\/\/bit.ly\/1vbpVEU\" rel=\"nofollow,noopener\"  target=\"_blank\">continues the discussion<\/a> on logs and threat prevention, detection and response.<\/p>\n<p>If you are unfamiliar with how to use URL categories in your security policy, <a href=\"http:\/\/bit.ly\/1ByZUze\" rel=\"nofollow,noopener\"  target=\"_blank\">these tips from Tsugunori Sugawara<\/a> provide you with powerful ways to protect your network and improve your bandwidth efficiency.<\/p>\n<p>We recommend that organizations subject to PCI compliance take additional steps to ensure up-to-date security beyond compliance requirements. <a href=\"http:\/\/bit.ly\/1xD2qH9\" rel=\"nofollow,noopener\"  target=\"_blank\">Isabelle Dumont discusses those steps<\/a>.<\/p>\n<p>We invite you to <a href=\"http:\/\/bit.ly\/1rB2q8c\" rel=\"nofollow,noopener\"  target=\"_blank\">view a webcast<\/a> featuring ISA99 Managing Director Joe Weiss and Palo Alto Networks SCADA Product Marketing Manager Del Rodillas, who will discuss cybersecurity for SCADA and ICS with an Oil &amp; Gas SCADA security practitioner and explain real world use cases and cyber incidents.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/9e46ec0d-1fe1-4aae-88c9-d5af00624ec2_PAN_SCADA_landing_page_header1.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:26.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6911 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/9e46ec0d-1fe1-4aae-88c9-d5af00624ec2_PAN_SCADA_landing_page_header1-500x132.png\" alt=\"{9e46ec0d-1fe1-4aae-88c9-d5af00624ec2}_PAN_SCADA_landing_page_header1\" width=\"500\" height=\"132\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/9e46ec0d-1fe1-4aae-88c9-d5af00624ec2_PAN_SCADA_landing_page_header1-500x132.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/9e46ec0d-1fe1-4aae-88c9-d5af00624ec2_PAN_SCADA_landing_page_header1-230x60.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/9e46ec0d-1fe1-4aae-88c9-d5af00624ec2_PAN_SCADA_landing_page_header1-510x135.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/9e46ec0d-1fe1-4aae-88c9-d5af00624ec2_PAN_SCADA_landing_page_header1-150x40.png 150w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/9e46ec0d-1fe1-4aae-88c9-d5af00624ec2_PAN_SCADA_landing_page_header1.png 517w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks will participate at .conf 2014, the 5th Annual Splunk Worldwide User Conference, taking place October 6-9 at the MGM Grand in Las Vegas. <a href=\"http:\/\/bit.ly\/1rCEfUx\" rel=\"nofollow,noopener\"  target=\"_blank\">Here's how to engage with us while at the show<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/BDG-conf2014-Sponsor-575x100-101.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:17.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6890 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/BDG-conf2014-Sponsor-575x100-101-500x86.jpg\" alt=\"BDG-conf2014-Sponsor-575x100-101\" width=\"500\" height=\"86\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/BDG-conf2014-Sponsor-575x100-101-500x86.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/BDG-conf2014-Sponsor-575x100-101-230x40.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/BDG-conf2014-Sponsor-575x100-101-510x88.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/BDG-conf2014-Sponsor-575x100-101.jpg 575w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Hear our CSO Rick Howard &amp; CIO Robert Quinn discuss \u201c<a href=\"http:\/\/bit.ly\/1nRaP14\" rel=\"nofollow,noopener\"  target=\"_blank\">CIO &amp; CSO in the C-Suite: Where Do They Belong?<\/a>\u201d at the Cyber Security EXPO in London on October 8.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cybersec-expo.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6710 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cybersec-expo.png\" alt=\"cybersec expo\" width=\"500\" height=\"63\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cybersec-expo.png 332w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cybersec-expo-230x29.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/cybersec-expo-240x30.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Visit Palo Alto Networks at <a href=\"http:\/\/bit.ly\/1ugxnyo\" rel=\"nofollow,noopener\"  target=\"_blank\">GITEX Technology Week<\/a> at the Dubai World Trade Centre on October 12-16 to review findings from our 2014 Application Usage and Threat Report to learn about the intertwined relationship between cyber attacks and applications, and understand what applications are most often targeted.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231.jpeg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6952 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231.jpeg\" alt=\"Unknown-500x123\" width=\"500\" height=\"123\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231.jpeg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231-230x56.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231-162x40.jpeg 162w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks will be on the scene at Black Hat Europe 2014 on October 16 and 17 to explain how adversaries seek to infiltrate global organizations and how by combining threat intelligence with a next-generation enterprise security platform, organizations can detect and prevent advanced threats. <a href=\"http:\/\/bit.ly\/1wNHBFI\" rel=\"nofollow,noopener\"  target=\"_blank\">Here\u2019s how to find us while we\u2019re there<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:32.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6853 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-500x163.png\" alt=\"{8499b00d-3ac8-4c6a-a663-5fffffc1e1d7}_PAN_BH14-LP-banner-Europe_Oct2014\" width=\"500\" height=\"163\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-500x163.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-230x75.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-510x166.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-122x40.png 122w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014.png 1045w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks returns to <a href=\"http:\/\/bit.ly\/1ycnK7G\" rel=\"nofollow,noopener\"  target=\"_blank\">Infosecurity: The Netherlands<\/a> on October 29 and 30. Visit our booth to hear about threats hiding in plain sight on your network, plus additional important insights from our <a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\">2014 Application Usage and Threat Report<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity.png\"><div style=\"max-width:100%\" data-width=\"312\"><span class=\"ar-custom\" style=\"padding-bottom:26.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6736 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity.png\" alt=\"logo-infosecurity\" width=\"312\" height=\"83\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity.png 312w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity-230x61.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity-150x40.png 150w\" sizes=\"auto, (max-width: 312px) 100vw, 312px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ2NA==\" target=\"_blank\">Fuel<\/a><\/p>\n<ul>\n<li>When: October 7, 2014 from 4:00 PM - 6:00 PM GMT+8:00<\/li>\n<li>Where: Brisbane, NSW<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQyNg==\" target=\"_blank\">Palo Alto Networks Public Sector Expert Forum!<\/a><\/p>\n<ul>\n<li>When: October 7, 2014 from 8:30 AM - 12:30 PM EST<\/li>\n<li>Where: Toronto, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ5OA==\" target=\"_blank\">The Harsh Reality of Cyber Protection<\/a><\/p>\n<ul>\n<li>When: October 7, 2014 from 10:00 AM - 11:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM1OA==\" target=\"_blank\">Palo Alto Networks at IP Expo 2014<\/a><\/p>\n<ul>\n<li>When: October 8, 2014 from 9:00 AM - 5:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUxMQ==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: October 8, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUwOA==\" target=\"_blank\">Security Compliance with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: October 8, 2014 from 10:00 AM - 11:00 AM CST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA2OA==\" target=\"_blank\">Black Hat Europe 2014<\/a><\/p>\n<ul>\n<li>When: October 14, 2014 9:00 AM - 6:00 PM CET<\/li>\n<li>Where: Amsterdam<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMyMw==\" target=\"_blank\">Demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva tarkoittaa k\u00e4yt\u00e4nn\u00f6ss\u00e4<\/a> [Finnish]<\/p>\n<ul>\n<li>When: October 15, 2014 1:00 PM - 2:00 PM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUxMg==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: October 15, 2014 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUyMQ==\" target=\"_blank\">Palo Alto Networks Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: October 16, 2014 10:00 AM - 2:00 PM CST<\/li>\n<li>Where: Houston, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM3MQ==\" target=\"_blank\">Online Demo: oplev vores N\u00e6ste Generations Firewall\u2019s r\u00e5 kraft<\/a> [Danish]<\/p>\n<ul>\n<li>When: October 17, 2014 11:00 AM - 12:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here is this week\u2019s top Palo Alto Networks news. &nbsp; We announced Traps Advanced Endpoint Protection, a revolutionary and unique offering designed to prevent sophisticated cyber attacks on endpoints. Learn more about &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[598,133,203],"tags":[806,682,786,715,778,313],"coauthors":[709],"class_list":["post-6959","post","type-post","status-publish","format-standard","hentry","category-endpoint-2","category-events","category-news-of-the-week","tag-black-hat-europe","tag-cyber-security-expo","tag-gitex-technology-week","tag-infosecurity-the-netherlands","tag-traps","tag-webcast"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6959"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6959\/revisions"}],"predecessor-version":[{"id":11312,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6959\/revisions\/11312"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6959"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}