{"id":7676,"date":"2014-12-13T05:00:56","date_gmt":"2014-12-13T13:00:56","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7676"},"modified":"2015-12-11T10:15:55","modified_gmt":"2015-12-11T18:15:55","slug":"palo-alto-networks-news-week-december-13","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/12\/palo-alto-networks-news-week-december-13\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 December 13"},"content":{"rendered":"<p>Here is all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\">Palo Alto Networks news<\/a> from this past week.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7596 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png\" alt=\"blog-title-unit42\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-510x69.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-240x32.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png 632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Unit 42 released its first <a href=\"http:\/\/bit.ly\/1uj5sdP\" rel=\"nofollow,noopener\"  target=\"_blank\">Threat Landscape Review<\/a>, which offers a high-level view of how malware is delivered to networks across major industries around the world, from healthcare to high tech. Check out this <a href=\"http:\/\/bit.ly\/1vWtr7b\" rel=\"nofollow,noopener\"  target=\"_blank\">infographic<\/a>, too, which represents a snapshot of key data from the report.<!--more--><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:50%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7610 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/PAN-Unit42-web-banner-600x310-500x250.jpg\" alt=\"PAN-Unit42-web-banner-600x310\" width=\"500\" height=\"250\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/PAN-Unit42-web-banner-600x310-500x250.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/PAN-Unit42-web-banner-600x310-230x115.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/PAN-Unit42-web-banner-600x310-510x255.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/PAN-Unit42-web-banner-600x310-80x40.jpg 80w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/PAN-Unit42-web-banner-600x310.jpg 600w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Unit 42 explored <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/dtls-vulnerabilities-cve-2014-6321\/\" target=\"_blank\">DTLS<\/a> vulnerabilities in CVE-2014-6321 and released signatures to defend against these vulnerabilities.<\/p>\n<p style=\"text-align: left;\">Want to have all of the latest insights, research and threat intelligence from Unit 42 delivered right to your inbox? <a href=\"http:\/\/bit.ly\/11k5XMP\" rel=\"nofollow,noopener\"  target=\"_blank\">Sign up today<\/a>.<\/p>\n<p>As 2014 comes to a close, Palo Alto Networks subject matter experts check in on what they see as major topics and trends for 2015:<\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1vtWmjQ\" rel=\"nofollow,noopener\"  target=\"_blank\">Kate Taylor on Threat Prevention<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/1Av6kmU\" rel=\"nofollow,noopener\"  target=\"_blank\">Brian Tokuyoshi on Mobile Security<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/1y5QAUb\" rel=\"nofollow,noopener\"  target=\"_blank\">Del Rodillas on Securing Industrial Control Systems<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/11VyR6a\" rel=\"nofollow,noopener\"  target=\"_blank\">Isabelle Dumont on Security in the Healthcare<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/2015-predictions-financial-services-and-payment-processing\/\" target=\"_blank\">Financial Services Industries<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/2015-predictions-datacenter\/\" target=\"_blank\">Matt Keil on Datacenter Security<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/1CK5xk9\" rel=\"nofollow,noopener\"  target=\"_blank\">Scott Simkin on Tailored Threat Intelligence<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/12NYxBV\" rel=\"nofollow,noopener\"  target=\"_blank\">Sebastian Goodwin on Endpoint Security<\/a><\/li>\n<\/ul>\n<p>Have you seen the <a href=\"http:\/\/bit.ly\/ZVnwBR\" rel=\"nofollow,noopener\"  target=\"_blank\">best love story<\/a> of 2014?<\/p>\n<p><div style=\"max-width:100%\" data-width=\"476\"><span class=\"ar-custom\" style=\"padding-bottom:56.3%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-7679 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/PAN-3.png\" alt=\"PAN 3\" width=\"476\" height=\"268\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/PAN-3.png 476w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/PAN-3-230x129.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/PAN-3-71x40.png 71w\" sizes=\"auto, (max-width: 476px) 100vw, 476px\" \/><\/span><\/div><\/p>\n<p>We recently kicked off Ignite 2015, officially, with the opening of online registration! <a href=\"http:\/\/bit.ly\/14dGir5\" rel=\"nofollow,noopener\"  target=\"_blank\">Read on<\/a> for all the reasons you need to be there this year.<\/p>\n<p>Also, we've opened <a href=\"http:\/\/bit.ly\/11Cwd66\" rel=\"nofollow,noopener\"  target=\"_blank\">the Call for Papers<\/a>, so if you have a good war story about an enterprise security deployment, don\u2019t forget to submit for a chance at a speaking slot. Deadline is Friday, December 19.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:30.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7424 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-500x151.jpg\" alt=\"email_CFP banner_PAN_IC15_660x200\" width=\"500\" height=\"151\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-500x151.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-230x69.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-510x154.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-132x40.jpg 132w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200.jpg 660w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>In this <a href=\"http:\/\/bit.ly\/1qAJt63\" rel=\"nofollow,noopener\"  target=\"_blank\">contributed post to the Cybersecurity Canon<\/a> series, Bob Clark, member of the Cybersecurity Canon committee and cyber operational lawyer for the Army Cyber Institute, reviews Where Wizards Stay Up Late: The Origins of The Internet by Katie Hafner.<\/p>\n<p>Congratulations to Salvatore, our <a href=\"http:\/\/bit.ly\/1wczZ0h\" rel=\"nofollow,noopener\"  target=\"_blank\">November winner<\/a> of the PA-7050 Picture It contest!<\/p>\n<p>Kate Taylor <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/hackers-vs-hacked-games-not\/\" target=\"_blank\">responded <\/a>to the recently published New York Times article, \"Hacked vs. #Hackers: Game On,\" discussing the current state of network security.<\/p>\n<p>CSO Rick Howard <a href=\"http:\/\/bit.ly\/1zCZOZy\" rel=\"nofollow,noopener\"  target=\"_blank\">discusses<\/a> the biggest challenges faced by CIOs and CISOs heading into 2015 in this CSO article.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7681 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/phpThumb_generated_thumbnailjpg-500x61.jpg\" alt=\"phpThumb_generated_thumbnailjpg\" width=\"500\" height=\"61\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/phpThumb_generated_thumbnailjpg-500x61.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/phpThumb_generated_thumbnailjpg-230x28.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/phpThumb_generated_thumbnailjpg-510x63.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/phpThumb_generated_thumbnailjpg-240x29.jpg 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/phpThumb_generated_thumbnailjpg.jpg 728w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Join Palo Alto Networks on December 18 for a <a href=\"http:\/\/bit.ly\/1IJA6XB\" rel=\"nofollow,noopener\"  target=\"_blank\">webinar<\/a> discussing what should be on your web security wish list, because better web security goes a long way toward making your network more secure.<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjY4MQ==\" target=\"_blank\">Palo Alto Networks demo<\/a> [Finnish]<\/p>\n<ul>\n<li>When: December 16, 2014 10:00 AM - 11:00 AM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU2NA==\" target=\"_blank\">12\u670817\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: December 17, 2014 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTgyMA==\" target=\"_blank\">Next Generation Security Technical Workshop<\/a><\/p>\n<ul>\n<li>When: December 17, 2014 10:00 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjcxNQ==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: December 17, 2014 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc0MQ==\" target=\"_blank\">Palo Alto's Next-Generation Security - Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: December 17, 2014 8:00 AM - 12:00 PM EST<\/li>\n<li>Where: Arlington, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU4NQ==\" target=\"_blank\">The Hobbit 3 Movie Premiere &amp; Technology Forum featuring Nir Zuk!<\/a><\/p>\n<ul>\n<li>When: December 17, 2014 9:00 AM - 1:00 PM EST<\/li>\n<li>Where: Foxboro, MA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc0Ng==\" target=\"_blank\">Cirque du Soleil-Amaluna Miami<\/a><\/p>\n<ul>\n<li>When: December 18, 2014 6:30 PM - 10:00 PM EST<\/li>\n<li>Where: Miami Gardens, FL<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc3MA==\" target=\"_blank\">Come prevenire le APT - Un approccio enterprise alla sicurezza<\/a> [Italian]<\/p>\n<ul>\n<li>When: December 18, 2014 11:00 AM - 11:30 AM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc2MQ==\" target=\"_blank\">Explorez les profondeurs - Pr\u00e9venir les menaces persistantes avanc\u00e9es<\/a> [French]<\/p>\n<ul>\n<li>When: December 18, 2014 11:00 AM - 12:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc0OA==\" target=\"_blank\">Web Security Wish List<\/a><\/p>\n<ul>\n<li>When: December 18, 2014 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc2NA==\" target=\"_blank\">Webinar: Prot\u00e9jase de las amenazas avanzadas persistentes<\/a> [Spanish]<\/p>\n<ul>\n<li>When: December 18, 2014 12:00 PM - 1:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU2OQ==\" target=\"_blank\">12\u670819\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: December 19, 2014 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc2Mg==\" target=\"_blank\">12\u670824\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a>[Japanese]<\/p>\n<ul>\n<li>When: December 24, 2014 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU1OA==\" target=\"_blank\">12\u670826\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a>[Japanese]<\/p>\n<ul>\n<li>When: December 26, 2014 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here is all of the top Palo Alto Networks news from this past week. &nbsp; &nbsp; Unit 42 released its first Threat Landscape Review, which offers a high-level view of how malware &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[394,925,251,396,973,97],"coauthors":[709],"class_list":["post-7676","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-pa7050pic","tag-2015-predictions","tag-cybersecurity-canon","tag-ignite-2015","tag-threat-landscape-review","tag-webinar"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7676"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7676\/revisions"}],"predecessor-version":[{"id":11450,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7676\/revisions\/11450"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7676"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}