{"id":7052,"date":"2014-10-18T13:00:31","date_gmt":"2014-10-18T20:00:31","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7052"},"modified":"2015-12-08T16:44:41","modified_gmt":"2015-12-09T00:44:41","slug":"palo-alto-networks-news-week-october-18","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/10\/palo-alto-networks-news-week-october-18\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 October 18"},"content":{"rendered":"<p>Here is this week\u2019s top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\">Palo Alto Networks news<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks announced this week that we have extended our enterprise security platform to bring next-generation security right to the public cloud \u2013 all while preserving speed and efficiency. <a href=\"http:\/\/bit.ly\/1szsSye\" rel=\"nofollow,noopener\"  target=\"_blank\">Find out more<\/a>.<\/p>\n<p>Sometimes Patch Tuesday comes and goes with little excitement or fanfare; this month was different. Unit 42 explains the significance of <a href=\"http:\/\/bit.ly\/1sSnR4m\" rel=\"nofollow,noopener\"  target=\"_blank\">October\u2019s \u201cSuper Tuesday,\u201d<\/a> and <a href=\"http:\/\/bit.ly\/1v9U8Vc\" rel=\"nofollow,noopener\"  target=\"_blank\">check out the new critical Internet Explorer vulnerability<\/a> impacting versions 6, 7, 8, 9 and 10 discovered by a Palo Alto Networks researcher.<!--more--><\/p>\n<p>Sebastian Goodwin with Palo Alto Networks is at Black Hat Europe in Amsterdam and wanted to <a href=\"http:\/\/bit.ly\/1wbczIb\" rel=\"nofollow,noopener\"  target=\"_blank\">share his experience<\/a> at a great hands-on workshop at the conference, \u201cPDF Attack: A Journey From the Exploit Kit to the Shellcode,\u201d hosted by Jose Miguel Esparza.<\/p>\n<p>This week three Google researchers revealed details around the latest attack on SSLv3, code named POODLE. The POODLE (Padding Oracle On Downgraded Legacy Encryption) attack allows an attacker who is already in the network path between the client and server to decrypt portions of the SSL session, including HTTP cookie data used for authentication. <a href=\"http:\/\/bit.ly\/1suUy6b\" rel=\"nofollow,noopener\"  target=\"_blank\">Unit 42 further examines this attack<\/a>.<\/p>\n<p>Brian Tokuyoshi <a href=\"http:\/\/bit.ly\/1pR7orX\" rel=\"nofollow,noopener\"  target=\"_blank\">highlights<\/a> security risks of devices connected to the Internet of Things (IoT) and how to secure them against unauthorized network access.<\/p>\n<p>Congratulations to our <a href=\"http:\/\/bit.ly\/ZWTwqi\" rel=\"nofollow,noopener\"  target=\"_blank\">September PA-7050 Picture It winners<\/a>, Brad &amp; Manish!<\/p>\n<p>Palo Alto Networks recently won <a href=\"http:\/\/bit.ly\/1oeWb9M\" rel=\"nofollow,noopener\"  target=\"_blank\">Mobile Security Solution of the Year<\/a>, honoring <a href=\"https:\/\/www.paloaltonetworks.com\/products\/technologies\/globalprotect.html\" target=\"_blank\">GlobalProtect<\/a>, at the 2014 Computing Security Awards in London. Many thanks to everyone who voted!<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/cs-awards-1.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7050 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/cs-awards-1-500x332.png\" alt=\"cs awards 1\" width=\"500\" height=\"332\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/cs-awards-1-500x332.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/cs-awards-1-230x152.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/cs-awards-1-451x300.png 451w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/cs-awards-1-60x40.png 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/cs-awards-1.png 548w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Join us on next Wednesday, October 22 for a webinar hosted by David Guretz, a Palo Alto Networks engineer and IT security expert to learn more about the hot topic of network segmentation in financial services. <a href=\"http:\/\/bit.ly\/1wK9ZrO\" rel=\"nofollow,noopener\"  target=\"_blank\">Register<\/a>.<\/p>\n<p>Did you catch Palo Alto Networks at GITEX Technology Week in Dubai this week? <a href=\"http:\/\/bit.ly\/ZEXxig\" rel=\"nofollow,noopener\"  target=\"_blank\">Check out scenes from the show<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231.jpeg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6952 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231.jpeg\" alt=\"Unknown-500x123\" width=\"500\" height=\"123\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231.jpeg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231-230x56.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Unknown-500x1231-162x40.jpeg 162w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Pamela Warren attended and spoke at AFCEA TechNet Europe last week in Paris. She participated in a panel delving into Modern Cyber Defence and whether it requires \"built-in security.\" <a href=\"http:\/\/bit.ly\/1txQO7t\" rel=\"nofollow,noopener\"  target=\"_blank\">Find out her key takeaways from the event<\/a>.<\/p>\n<p><center><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/AFCEA.jpeg\"><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:99.57%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7053 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/AFCEA-230x229.jpeg\" alt=\"AFCEA\" width=\"230\" height=\"229\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/AFCEA-230x229.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/AFCEA-100x100.jpeg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/AFCEA-300x300.jpeg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/AFCEA-40x40.jpeg 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/AFCEA-32x32.jpeg 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/AFCEA-64x64.jpeg 64w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/AFCEA-96x96.jpeg 96w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/AFCEA-128x128.jpeg 128w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/AFCEA.jpeg 400w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/a><\/center>&nbsp;<\/p>\n<p>Last week we brought our top partners from Europe, the Middle East and Africa to Barcelona for our 6th Annual NextWave Partner Conference. <a href=\"http:\/\/bit.ly\/1rHYvkb\" rel=\"nofollow,noopener\"  target=\"_blank\">Watch this video<\/a> to hear from our executives and partners about what propelled growth behind our Enterprise Security Platform in 2014 \u2014 and what will keep EMEA on an upswing throughout the next 12 months.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/MG_2822.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:64%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7054 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/MG_2822-500x320.jpg\" alt=\"_MG_2822\" width=\"500\" height=\"320\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/MG_2822-500x320.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/MG_2822-230x147.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/MG_2822-467x300.jpg 467w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/MG_2822-62x40.jpg 62w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks returns to <a href=\"http:\/\/bit.ly\/1ycnK7G\" rel=\"nofollow,noopener\"  target=\"_blank\">Infosecurity: The Netherlands<\/a> on October 29 and 30. Visit our booth to hear about threats hiding in plain sight on your network, plus additional important insights from our <a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\">2014 Application Usage and Threat Report<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:26.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6736 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity.png\" alt=\"logo-infosecurity\" width=\"500\" height=\"133\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity.png 312w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity-230x61.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/logo-infosecurity-150x40.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>We invite you to <a href=\"http:\/\/bit.ly\/1rB2q8c\" rel=\"nofollow,noopener\"  target=\"_blank\">view a webcast<\/a> featuring ISA99 Managing Director Joe Weiss and Palo Alto Networks SCADA Product Marketing Manager Del Rodillas, who will discuss cybersecurity for SCADA and ICS with an Oil &amp; Gas SCADA security practitioner and explain real world use cases and cyber incidents.<\/p>\n<p>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQxOA==\" target=\"_blank\">Customer Forum: Hear from our experts on Advanced Threats<\/a><\/p>\n<ul>\n<li>When: October 22, 2014 8:30 AM - 12:30 PM MST<\/li>\n<li>Where: Calgary, AB<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU1Mg==\" target=\"_blank\">Expose The Underground - Prevent Advanced Persistent Threats<\/a><\/p>\n<ul>\n<li>When: October 22, 2014 10:30 AM - 12:00 PM GMT+4:00<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ0MQ==\" target=\"_blank\">Hiding in Plain Sight - What\u2019s Really Happening on Your Network<\/a><\/p>\n<ul>\n<li>When: October 22, 2014 2:00 PM - 3:00 PM BST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM2NQ==\" target=\"_blank\">Opplev styrken i Next-Generation Brannmurer<\/a> [Norwegian]<\/p>\n<ul>\n<li>When: October 22, 2014 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU1NQ==\" target=\"_blank\">Palo Alto Networks webinar - Control your Own Cyberspace<\/a><\/p>\n<ul>\n<li>When: October 22, 2014 2:00 PM - 3:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUxMw==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: October 22, 2014 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQxOQ==\" target=\"_blank\">Customer Forum: Hear from our experts on Advanced Threats<\/a><\/p>\n<ul>\n<li>When: October 23, 2014 8:30 AM - 12:30 PM PST<\/li>\n<li>Where: Vancouver, BC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUxNw==\" target=\"_blank\">Preventing Cyberattacks in Your Datacenter<\/a><\/p>\n<ul>\n<li>When: October 23, 2014 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUyNA==\" target=\"_blank\">Presales Technical Enablement Workshop<\/a><\/p>\n<ul>\n<li>When: October 28, 2014 9:00 AM - 5:00 PM EST<\/li>\n<li>Where: Tampa, FL<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQ5NQ==\" target=\"_blank\">Hiding in Plain Sight - What\u2019s Really Happening on Your Network<\/a> [Dutch]<\/p>\n<ul>\n<li>When: October 29, 2014 9:30 AM - 5:00 PM EET<\/li>\n<li>Where: Utrecht<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTgxOA==\" target=\"_blank\">Next Generation Security Technical Workshop<\/a><\/p>\n<ul>\n<li>When: October 29, 2014 10:00 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU0NA==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: October 29, 2014 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU1NA==\" target=\"_blank\">Palo Alto Networks Next-Generation Security - Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: October 29, 2014 9:00 AM - 1:00 PM EST<\/li>\n<li>Where: Hanover, MD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU1Mw==\" target=\"_blank\">\u041e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f \u043e\u0442 \u0441\u043b\u043e\u0436\u043d\u044b\u0445 \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u044b\u0445 \u0443\u0433\u0440\u043e\u0437 (APT)<\/a> [Russian]<\/p>\n<ul>\n<li>When: October 30, 2014 10:30 AM - 12:00 PM GMT+4:00<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA2Ng==\" target=\"_blank\">Palo Alto Networks &amp; Westcon Security Seminar<\/a> [Italian]<\/p>\n<ul>\n<li>When: November 4, 2014 10:00 AM - 2:30 PM CET<\/li>\n<li>Where: Roma<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUzMw==\" target=\"_blank\">Expose the Underground with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: November 5, 2014 6:00 PM - 8:00 PM EST<\/li>\n<li>Where: Nashville, TN<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU3NA==\" target=\"_blank\">Opplev styrken i Next-Generation Brannmurer<\/a> [Norwegian]<\/p>\n<ul>\n<li>When: November 5, 2014 1:00 PM - 2:00 PM MEZ<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU0NQ==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: November 5, 2014 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU2Ng==\" target=\"_blank\">11\u67087\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: November 7, 2014 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here is this week\u2019s top Palo Alto Networks news. &nbsp; Palo Alto Networks announced this week that we have extended our enterprise security platform to bring next-generation security right to the public &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[394,822,806,621,198,715,827],"coauthors":[709],"class_list":["post-7052","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-pa7050pic","tag-afcea","tag-black-hat-europe","tag-computing-security-awards","tag-gitex","tag-infosecurity-the-netherlands","tag-nextwave-partner-conference"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7052"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7052\/revisions"}],"predecessor-version":[{"id":11308,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7052\/revisions\/11308"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7052"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}