{"id":80354,"date":"2018-06-23T04:00:53","date_gmt":"2018-06-23T11:00:53","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=80354"},"modified":"2018-06-22T09:13:26","modified_gmt":"2018-06-22T16:13:26","slug":"news-week-june-23-2018","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/06\/news-week-june-23-2018\/","title":{"rendered":"News of the Week: June 23, 2018"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry \u2013 we\u2019ve rounded up our top news and views right here:<\/p>\n<ul>\n<li>The <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/06\/unit42-dont-panic-software-supply-chain-attacks\/\">Unit 42 Don\u2019t Panic podcast<\/a> is back! Check out the latest episode exploring supply chain attacks.<\/li>\n<li>Unit 42 shared new research:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/06\/unit42-phishing-nutshell-january-march-2018\/\">Phishing in a Nutshell: January \u2013 March 2018<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/06\/unit42-the-old-and-new-current-trends-in-web-based-threats\/\">The Old and New: Current Trends in Web-based Threats<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/06\/unit42-tick-group-weaponized-secure-usb-drives-target-air-gapped-critical-systems\/\">Tick Group Weaponized Secure USB Drives to Target Air-Gapped Critical Systems<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Our look into the evolving role of the CISO continues with why it\u2019s important to <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/06\/cisos-must-incorporate-regional-laws-regulations-cyber-strategy\/\">incorporate regional laws and regulations into cybersecurity<\/a>.<\/li>\n<li>Here are 3 important updates for <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/06\/partner-3-new-nextwave-partner-program-updates\/\">Palo Alto Networks NextWave Partners<\/a>.<\/li>\n<li>Learn how Palo Alto Networks is contributing to the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/06\/gov-palo-alto-networks-commitment-educating-european-ceos-boards-cybersecurity-business-issue\/\">growing emphasis on cybersecurity awareness and skills in the EU<\/a>.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Upcoming Events<\/strong><\/p>\n<p>Take a look at <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:57.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-65011 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/02\/ignite18Europe-linkedin-shared-1.png\" alt=\"ignite18Europe-linkedin-shared (1)\" width=\"600\" height=\"344\" \/><\/span><\/div><\/p>\n<p>We\u2019re bringing hands-on disruption to Amsterdam! Learn more about <a href=\"https:\/\/ignite.paloaltonetworks.com\/europe\/europe_home.html\">Ignite \u201918 Europe<\/a>.<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/333444\">Cyber Tuesday \u2013 Cyber Range Level 1<\/a><\/p>\n<ul>\n<li>June 26, 2018<\/li>\n<li>Reston, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/333447\">Cyber Tuesday \u2013 Cyber Range Level 1<\/a><\/p>\n<ul>\n<li>June 26, 2018<\/li>\n<li>Santa Clara, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/332716\">Virtual Ultimate Test Drive - Migration Process<\/a><\/p>\n<ul>\n<li>June 26, 2018<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/342872\">Virtual Ultimate Test Drive With the VM-Series on Microsoft Azure<\/a><\/p>\n<ul>\n<li>June 28, 2018<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/332719\">Virtual Ultimate Test Drive - Advanced Endpoint Protection<\/a><\/p>\n<ul>\n<li>July 2, 2018<\/li>\n<li>Online<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Looking to meet up with other Palo Alto Networks users? Check out <a href=\"https:\/\/www.fuelusergroup.org\/page\/spark-events\" rel=\"nofollow,noopener\" >Fuel, the Palo Alto Networks User Group<\/a>, for opportunities to attend hands-on workshops, events and more!<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Catch up on all the latest Palo Alto Networks news of the week. <\/p>\n","protected":false},"author":153,"featured_media":45207,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[94,1105,6086,2227,403,123,3288,6089,208,622,586],"coauthors":[1515],"class_list":["post-80354","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-ciso","tag-dont-panic","tag-elink","tag-eu","tag-events-2","tag-government2","tag-nextwave-partner","tag-nextwave-partners","tag-phishing","tag-podcast","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/10\/Linkedin-520x320-v1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/80354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=80354"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/80354\/revisions"}],"predecessor-version":[{"id":80357,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/80354\/revisions\/80357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/45207"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=80354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=80354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=80354"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=80354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}