{"id":6980,"date":"2014-10-10T18:00:37","date_gmt":"2014-10-11T01:00:37","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6980"},"modified":"2021-03-22T08:46:41","modified_gmt":"2021-03-22T15:46:41","slug":"palo-alto-networks-news-week-october-10","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/10\/palo-alto-networks-news-week-october-10\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 October 10"},"content":{"rendered":"<p>Here is this week\u2019s top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/bit.ly\/1E9M2j6\" target=\"_blank\" rel=\"noopener\">Customer Spotlight<\/a>: Golan Ben-Oni, CSO &amp; SVP of Architecture for IDT Corporation on the value of <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/09\/traps-advanced-endpoint-protection\/\" target=\"_blank\" rel=\"noopener\">Traps, our new Advanced Endpoint Protection<\/a>.<!--more--><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/golan.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:53.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/golan.png\" alt=\"golan\" width=\"500\" height=\"269\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/golan.png 492w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/golan-230x123.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/golan-74x40.png 74w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Congratulations to our <a href=\"http:\/\/bit.ly\/ZiD7vc\" target=\"_blank\" rel=\"noopener\">Top Partners in EMEA<\/a>!<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg\"><div style=\"max-width:100%\" data-width=\"483\"><span class=\"ar-custom\" style=\"padding-bottom:50.93%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-4920 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg\" alt=\"NextWave logo-final\" width=\"483\" height=\"246\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg 483w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-230x117.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-78x40.jpeg 78w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"http:\/\/bit.ly\/1n04zsE\" target=\"_blank\" rel=\"noopener\">DNS Sinkholing<\/a>: Kate Taylor explains what it is, how it works, and how to pinpoint infected devices with PAN-OS 6.0.<\/p>\n<p>Unit 42 explores\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/10\/rovnix-declaration-generation-algorithm\/\">Rovnix and the Declaration Generation Algorithm<\/a>.<\/p>\n<p>ISMG\u2019s recent Advanced Persistent Threats Survey, sponsored by Palo Alto Networks, reviews the current APT landscape, as well as where traditional security solutions fall short. <a href=\"http:\/\/bit.ly\/1t03xiZ\" target=\"_blank\" rel=\"noopener\">Find out more<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apt-survey1.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:61.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6982 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apt-survey1-500x306.png\" alt=\"apt survey\" width=\"500\" height=\"306\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apt-survey1-500x306.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apt-survey1-230x140.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apt-survey1-489x300.png 489w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apt-survey1-65x40.png 65w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apt-survey1.png 640w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Matt Keil discusses the question: <a href=\"http:\/\/bit.ly\/1vleAji\" target=\"_blank\" rel=\"noopener\">Are cyberlockers making money on your network<\/a>?<\/p>\n<p>Palo Alto Networks <a href=\"http:\/\/bit.ly\/1uFOQjV\" target=\"_blank\" rel=\"noopener\">safeguards enterprises with industry-leading Internet Explorer vulnerability research<\/a> and will discuss latest in IE research techniques at Black Hat Europe.<\/p>\n<p>Find out which <a href=\"http:\/\/bit.ly\/1s6MrOf\" target=\"_blank\" rel=\"noopener\">government, industry and cybersecurity events<\/a> our members of the Unit 42 threat intelligence team will present at in October and November.<\/p>\n<p>Unit 42's Ryan Olson to speak at upcoming <a href=\"http:\/\/bit.ly\/1tnmNkO\" target=\"_blank\" rel=\"noopener\">FS-ISAC Fall Summit<\/a> in Washington DC on cybersecurity innovations, next Wednesday, October 15 at 10:00 am EST.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/financial-serv.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:26.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6933 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/financial-serv-500x133.png\" alt=\"financial serv\" width=\"500\" height=\"133\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/financial-serv-500x133.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/financial-serv-230x61.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/financial-serv-149x40.png 149w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/financial-serv.png 509w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Visit Palo Alto Networks at <a href=\"http:\/\/bit.ly\/1ugxnyo\" target=\"_blank\" rel=\"noopener\">GITEX Technology Week<\/a> at the Dubai World Trade Centre on October 12-16 to review findings from our 2014 Application Usage and Threat Report to learn about the intertwined relationship between cyber attacks and applications, and understand what applications are most often targeted.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231.jpeg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6952 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231.jpeg\" alt=\"Unknown-500x123\" width=\"500\" height=\"123\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231.jpeg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231-230x56.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231-162x40.jpeg 162w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks will be on the scene at Black Hat Europe 2014 on October 16 and 17 to explain how adversaries seek to infiltrate global organizations and how by combining threat intelligence with a next-generation enterprise security platform, organizations can detect and prevent advanced threats. <a href=\"http:\/\/bit.ly\/1wNHBFI\" target=\"_blank\" rel=\"noopener\">Here\u2019s how to find us while we\u2019re there<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:32.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6853 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-500x163.png\" alt=\"{8499b00d-3ac8-4c6a-a663-5fffffc1e1d7}_PAN_BH14-LP-banner-Europe_Oct2014\" width=\"500\" height=\"163\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-500x163.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-230x75.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-510x166.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014-122x40.png 122w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/8499b00d-3ac8-4c6a-a663-5fffffc1e1d7_PAN_BH14-LP-banner-Europe_Oct2014.png 1045w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks returns to <a href=\"http:\/\/bit.ly\/1ycnK7G\" target=\"_blank\" rel=\"noopener\">Infosecurity: The Netherlands<\/a> on October 29 and 30. Visit our booth to hear about threats hiding in plain sight on your network, plus additional important insights from our <a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\" rel=\"noopener\">2014 Application Usage and Threat Report<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:26.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6736 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity.png\" alt=\"logo-infosecurity\" width=\"500\" height=\"133\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity.png 312w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity-230x61.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity-150x40.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>We invite you to <a href=\"http:\/\/bit.ly\/1rB2q8c\" target=\"_blank\" rel=\"noopener\">view a webcast<\/a> featuring ISA99 Managing Director Joe Weiss and Palo Alto Networks SCADA Product Marketing Manager Del Rodillas, who will discuss cybersecurity for SCADA and ICS with an Oil &amp; Gas SCADA security practitioner and explain real world use cases and cyber incidents.<\/p>\n<p>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU0Mg==\" target=\"_blank\" rel=\"noopener\">Gitex Technology Week 2014<\/a><\/p>\n<ul>\n<li>When: October 12, 2014 1:00 PM - 7:00 PM GMT+4:00<\/li>\n<li>Where: Dubai<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA2OA==\" target=\"_blank\" rel=\"noopener\">Black Hat Europe 2014<\/a><\/p>\n<ul>\n<li>When: October 14, 2014 9:00 AM - 6:00 PM CET<\/li>\n<li>Where: Amsterdam<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMyMw==\" target=\"_blank\" rel=\"noopener\">Demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva tarkoittaa k\u00e4yt\u00e4nn\u00f6ss\u00e4<\/a> [Finnish]<\/p>\n<ul>\n<li>When: October 15, 2014 1:00 PM - 2:00 PM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUxMg==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: October 15, 2014 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUyMQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: October 16, 2014 10:00 AM - 2:00 PM CST<\/li>\n<li>Where: Houston, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM3MQ==\" target=\"_blank\" rel=\"noopener\">Online Demo: oplev vores N\u00e6ste Generations Firewall\u2019s r\u00e5 kraft<\/a> [Danish]<\/p>\n<ul>\n<li>When: October 17, 2014 11:00 AM - 12:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQxOA==\" target=\"_blank\" rel=\"noopener\">Customer Forum: Hear from our experts on Advanced Threats<\/a><\/p>\n<ul>\n<li>When: October 22, 2014 8:30 AM - 12:30 PM MST<\/li>\n<li>Where: Calgary, AB<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU1Mg==\" target=\"_blank\" rel=\"noopener\">Expose The Underground - Prevent Advanced Persistent Threats<\/a><\/p>\n<ul>\n<li>When: October 22, 2014 10:30 AM - 12:00 PM GMT+4:00<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ0MQ==\" target=\"_blank\" rel=\"noopener\">Hiding in Plain Sight - What\u2019s Really Happening on Your Network<\/a><\/p>\n<ul>\n<li>When: October 22, 2014 2:00 PM - 3:00 PM BST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM2NQ==\" target=\"_blank\" rel=\"noopener\">Opplev styrken i Next-Generation Brannmurer<\/a>\u00a0[Norweigian]<\/p>\n<ul>\n<li>When: October 22, 2014 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUxMw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: October 22, 2014 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQxOQ==\" target=\"_blank\" rel=\"noopener\">Customer Forum: Hear from our experts on Advanced Threats<\/a><\/p>\n<ul>\n<li>When: October 23, 2014 8:30 AM - 12:30 PM PST<\/li>\n<li>Where: Vancouver, BC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUxNw==\" target=\"_blank\" rel=\"noopener\">Preventing Cyberattacks in Your Datacenter<\/a><\/p>\n<ul>\n<li>When: October 23, 2014 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here is this week\u2019s top Palo Alto Networks news. &nbsp; Customer Spotlight: Golan Ben-Oni, CSO &amp; SVP of Architecture for IDT Corporation on the value of Traps, our new Advanced Endpoint Protection.<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[806,802,798,417,198,715,793,355,778],"coauthors":[709],"class_list":["post-6980","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-black-hat-europe","tag-cyberlockers","tag-dns-sinkholing","tag-fs-isac","tag-gitex","tag-infosecurity-the-netherlands","tag-ismg","tag-nextwave","tag-traps"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6980"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6980\/revisions"}],"predecessor-version":[{"id":128792,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6980\/revisions\/128792"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6980"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}