{"id":8041,"date":"2015-01-31T12:00:46","date_gmt":"2015-01-31T20:00:46","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8041"},"modified":"2021-03-21T09:09:32","modified_gmt":"2021-03-21T16:09:32","slug":"palo-alto-networks-news-week-january-31-2","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/01\/palo-alto-networks-news-week-january-31-2\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 January 31"},"content":{"rendered":"<p>Here is all the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a> from the last week of January.<\/p>\n<p>&nbsp;<\/p>\n<p>The Ignite Conference early bird rate and the special CNSE exam offer both expire TODAY. <a href=\"http:\/\/bit.ly\/15LBcCS\" target=\"_blank\" rel=\"noopener\">Register right now<\/a> to ensure you don\u2019t miss out on these deals.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"400\"><span class=\"ar-custom\" style=\"padding-bottom:27.5%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-7354 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg\" alt=\"ignite 2015\" width=\"400\" height=\"110\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-230x63.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-145x40.jpg 145w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/span><\/div><!--more--><\/p>\n<p>Kate Taylor <a href=\"http:\/\/bit.ly\/1GIDaVr\" target=\"_blank\" rel=\"noopener\">discusses why<\/a> malvertising concerns her more than the average attack method, and what Palo Alto Networks does to help thwart malvertising threats.<\/p>\n<p>On January 22 Adobe confirmed the existence of a Zero Day affecting Adobe Flash Player 16.0.0.287 and assigned CVE-2015-0311 to it. This is the classic zero day scenario of exploitation in the wild before any vendor patch was available and <a href=\"http:\/\/bit.ly\/1C8fFSS\" target=\"_blank\" rel=\"noopener\">here Yiftach Keshet explains<\/a> how the uniqueness of Palo Alto Networks Traps blocks this vulnerability.<\/p>\n<p>Joerg Sieber <a href=\"http:\/\/bit.ly\/18lHtGS\" target=\"_blank\" rel=\"noopener\">explains why<\/a> standard web security won\u2019t keep the Internet of Things safe.<\/p>\n<p>CTB-Locker is a well-known ransomware Trojan used by crimeware groups to encrypt files on the victim\u2019s endpoints, and demand ransom payment to decrypt the files back to their original state. <a href=\"http:\/\/bit.ly\/1wByohB\" target=\"_blank\" rel=\"noopener\">Find out how<\/a> Palo Alto Networks Enterprise Security Platform could have stopped this ransomware attack campaign, and <a href=\"http:\/\/bit.ly\/1zFywUS\" target=\"_blank\" rel=\"noopener\">how to protect yourself<\/a> from CTB-Locker, even if you aren\u2019t protected by the Enterprise Security Platform.<\/p>\n<p>Rick Howard reviews the book \"<a href=\"http:\/\/bit.ly\/1Dhi8r5\" target=\"_blank\" rel=\"noopener\">Countdown to Zero Day: Stuxnet and the Launch of the World\u2019s First Digital Weapon<\/a>\" by Kim Zetter, and discusses why it is Cybersecurity Canon-worthy, and <a href=\"http:\/\/bit.ly\/1LrNy3T\" target=\"_blank\" rel=\"noopener\">gives his thoughts<\/a> on Alan Turing and \u2018The Imitation Game.\u2019<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:60.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-7984 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC.jpg\" alt=\"PAN_BlogHeader_Cybersecurity Canon\" width=\"500\" height=\"303\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC-230x139.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC-495x300.jpg 495w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC-66x40.jpg 66w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><a href=\"http:\/\/bit.ly\/1ENT9Nn\" target=\"_blank\" rel=\"noopener\">Customer Spotlight<\/a>: Game, set, match for Australian Open host, Tennis Australia. Find out why Palo Alto Networks is proud to play a role in the IT infrastructure that supports how Tennis Australia uses IT data to improve the experience of everyone from its own security team, to sports journalists covering the tournament, to customers looking to improve their backhands.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"189\"><span class=\"ar-custom\" style=\"padding-bottom:76.19%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-7977 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/tennis_australia.png\" alt=\"tennis_australia\" width=\"189\" height=\"144\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/tennis_australia.png 189w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/tennis_australia-52x40.png 52w\" sizes=\"auto, (max-width: 189px) 100vw, 189px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>How well do you know your Zero Days and APTs? <a href=\"http:\/\/bit.ly\/1CgBCO6\" target=\"_blank\" rel=\"noopener\">Take the challenge<\/a> where knowledge of the worst threats out there could win you great prizes.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7915 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-500x500.jpg\" alt=\"promotion_4[3]\" width=\"500\" height=\"500\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-500x500.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-230x230.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-300x300.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-40x40.jpg 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-32x32.jpg 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-64x64.jpg 64w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-96x96.jpg 96w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-128x128.jpg 128w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43.jpg 590w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Palo Alto Networks founder and CTO Nir Zuk is making the rounds in Australia and New Zealand next week. <a href=\"http:\/\/bit.ly\/1yeU70k\" target=\"_blank\" rel=\"noopener\">Here is where you can catch him<\/a>.\u00a0You can also catch\u00a0Nir on a recent edition of Patrick Gray\u2019s Risky Business podcast. <a href=\"http:\/\/risky.biz\/RB350\" target=\"_blank\" rel=\"noopener\">Listen here<\/a>.<\/p>\n<p>Headed to next week\u2019s VMware Partner Exchange? <a href=\"http:\/\/bit.ly\/15PB9GR\" target=\"_blank\" rel=\"noopener\">Come visit Palo Alto Networks<\/a> at booth #720, and at our lab to participate in, \u201cVirtualized Data Center Security using Palo Alto Networks Next-generation Firewalls with VMware NSX,\u201d hosted by Warby Warburton, Senior Technical Marketing Engineer for Palo Alto Networks.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:10.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7964 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/vmware-partner-exchange-500x53.png\" alt=\"vmware partner exchange\" width=\"500\" height=\"53\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/vmware-partner-exchange-500x53.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/vmware-partner-exchange-230x24.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/vmware-partner-exchange-510x54.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/vmware-partner-exchange-240x25.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/vmware-partner-exchange.png 1002w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyMg==\" target=\"_blank\" rel=\"noopener\">Lunch with Nir Zuk, Founder &amp; CTO, Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: February 3, 2015 12:00 PM - 2:00 PM GMT+13:00<\/li>\n<li>Where: Auckland<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzMA==\" target=\"_blank\" rel=\"noopener\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>When: February 4, 2015 11:00 AM - 12:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyMA==\" target=\"_blank\" rel=\"noopener\">Breakfast with Nir Zuk, Founder &amp; CTO, Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: February 4, 2015 7:30 AM - 9:00 AM GMT+11:00<\/li>\n<li>Where: Melbourne, VIC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg3Ng==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: February 4, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc4MQ==\" target=\"_blank\" rel=\"noopener\">Virtual Data Centre Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: February 4, 2015 10:00 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg5OA==\" target=\"_blank\" rel=\"noopener\">Cyber Security Predictions: What to Expect in 2015<\/a><\/p>\n<ul>\n<li>When: February 5, 2015 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkyNg==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive \u2013 2015<\/a> [French]<\/p>\n<ul>\n<li>When: February 5, 2015 9:00 AM - 1:00 PM CET<\/li>\n<li>Where: Issy-les-Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyMw==\" target=\"_blank\" rel=\"noopener\">2\u67086\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: February 6, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyMQ==\" target=\"_blank\" rel=\"noopener\">Breakfast with Nir Zuk, Founder &amp; CTO, Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: February 6, 2015 7:30 AM - 9:00 AM GMT+11:00<\/li>\n<li>Where: The Rocks, NSW<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg2NQ==\" target=\"_blank\" rel=\"noopener\">Die Zwei um Zw\u00f6lf - Modern Malware - Bedrohungsanalyse heute<\/a> [German]<\/p>\n<ul>\n<li>When: February 6, 2015 12:00 PM - 1:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzMQ==\" target=\"_blank\" rel=\"noopener\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>When: February 11, 2015 11:00 AM - 12:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1MA==\" target=\"_blank\" rel=\"noopener\">Avoiding Doom in the Data Center<\/a><\/p>\n<ul>\n<li>When: February 11, 2015 10:00 AM - 12:00 PM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg5NQ==\" target=\"_blank\" rel=\"noopener\">Next-Generation Firewall Performance Testing<\/a><\/p>\n<ul>\n<li>When: February 11, 2015 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg3Nw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: February 11, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg2OQ==\" target=\"_blank\" rel=\"noopener\">Transform Network Security With the Software Defined Data Center<\/a><\/p>\n<ul>\n<li>When: February 11, 2015 4:00 PM - 5:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk3Ng==\" target=\"_blank\" rel=\"noopener\">Advanced Endpoint Protection - We're Changing the Game!<\/a><\/p>\n<ul>\n<li>When: February 12, 2015 10:00 AM - 11:00 AM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk2Nw==\" target=\"_blank\" rel=\"noopener\">Demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva ta<\/a> [Finnish]<\/p>\n<ul>\n<li>When: February 12, 2015 1:00 PM - 2:00 PM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1MQ==\" target=\"_blank\" rel=\"noopener\">Opplev styrken i Next-Generation Brannmurer<\/a> [Norwegian]<\/p>\n<ul>\n<li>When: February 12, 2015 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzNg==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive \u2013 2015<\/a> [French]<\/p>\n<ul>\n<li>When: February 12, 2015 9:00 AM - 1:00 PM CET<\/li>\n<li>Where: Issy-les-Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgzOA==\" target=\"_blank\" rel=\"noopener\">2\u670813\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70(\u5927\u962a)<\/a> [Japanese]<\/p>\n<ul>\n<li>When: February 13, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5927\u962a\u5e02\u5317\u533a<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here is all the top Palo Alto Networks news from the last week of January. &nbsp; The Ignite Conference early bird rate and the special CNSE exam offer both expire TODAY. Register &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1044,454,396,923,221,778,1032],"coauthors":[709],"class_list":["post-8041","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-ctb-locker","tag-enterprise-security-platform","tag-ignite-2015","tag-malvertising","tag-ransomware","tag-traps","tag-vmware-partner-exchange"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8041"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8041\/revisions"}],"predecessor-version":[{"id":128727,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8041\/revisions\/128727"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8041"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}