{"id":8127,"date":"2015-02-07T04:00:19","date_gmt":"2015-02-07T12:00:19","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8127"},"modified":"2021-03-21T09:14:03","modified_gmt":"2021-03-21T16:14:03","slug":"palo-alto-networks-news-week-february-7-2","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/02\/palo-alto-networks-news-week-february-7-2\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 February 7"},"content":{"rendered":"<p>Did everyone have a good first week of February? Check out all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a> from this past week.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/bit.ly\/1wTy9i1\" target=\"_blank\" rel=\"noopener\">Unit 42 explains<\/a> how best to protect your network from the I2P communication used by Dyre and CryptoWall 3.0.<\/p>\n<p>Yiftach Keshet <a href=\"http:\/\/bit.ly\/1BSpQG4\" target=\"_blank\" rel=\"noopener\">details<\/a> how Palo Alto Networks Traps protects enterprises from zero-day CVE-2015-0313.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1zcpfgm\" target=\"_blank\" rel=\"noopener\">Unit 42 analyzes Filmkan<\/a>, a mysterious Turkish botnet that grows through Facebook and has potentially infected over 100,000 users.<!--more--><\/p>\n<p>The enterprise security event of the year is happening this March 30 \u2013 April 1 in Las Vegas \u2013 will you be there? <a href=\"http:\/\/bit.ly\/1zGWjRi\" target=\"_blank\" rel=\"noopener\">Check out the latest additions<\/a> to the conference program and find out how to solve your toughest security challenges at Ignite.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"400\"><span class=\"ar-custom\" style=\"padding-bottom:27.5%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-7354 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg\" alt=\"ignite 2015\" width=\"400\" height=\"110\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-230x63.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-145x40.jpg 145w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/span><\/div><\/p>\n<p>In partnership with MeriTalk, we developed a \u201chealth check\u201d for U.S. federal government agencies &amp; surveyed 300 U.S. Federal IT managers to understand security issues that are top of mind in their data center plans. <a href=\"http:\/\/bit.ly\/1BZeFOm\" target=\"_blank\" rel=\"noopener\">Check out the results<\/a>, and remember, the threats to federal systems will only continue to grow, so <a href=\"http:\/\/bit.ly\/1zcxKrP\" target=\"_blank\" rel=\"noopener\">don\u2019t let security be a roadblock to your government data center modernization<\/a>.<\/p>\n<p>Are you a NextWave partner? Be sure to <a href=\"http:\/\/bit.ly\/1BVkj1i\" target=\"_blank\" rel=\"noopener\">check out this VideoWave update<\/a> on global channel enablement from Ron Myers, VP of Worldwide Channels.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7597 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave-500x68.png\" alt=\"blog-title-nextwave\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave-510x69.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave-240x32.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave.png 632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Nir Zuk, Founder &amp; CTO, appeared on <a href=\"http:\/\/bit.ly\/1DCH5gZ\" target=\"_blank\" rel=\"noopener\">Risky Business<\/a> to chat about disrupting the endpoint security market the same way Palo Alto Networks disrupted the firewall market in our early days.<\/p>\n<p><a href=\"http:\/\/bit.ly\/16iqO5U\" target=\"_blank\" rel=\"noopener\">Arnaud Kopp, CTO for Southern Europe, talks<\/a> cybersecurity trends and how to employ a prevention-based approach to protecting critical interests in enterprise and government at the International Forum on Cybersecurity in Lille, France.<\/p>\n<p>How well do you know your zero days and APTs? <a href=\"http:\/\/bit.ly\/1CgBCO6\" target=\"_blank\" rel=\"noopener\">Take the challenge<\/a> where knowledge of the worst threats out there could win you great prizes.<\/p>\n<p>Join us this February for <a href=\"http:\/\/bit.ly\/1F0ewuK\" target=\"_blank\" rel=\"noopener\">one of our live webinars<\/a> to learn about Traps, the breakthrough technology that redefines endpoint security as we know it.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8059 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg-500x61.jpg\" alt=\"phpThumb_generated_thumbnailjpg\" width=\"500\" height=\"61\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg-500x61.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg-230x28.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg-510x63.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg-240x29.jpg 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg.jpg 728w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk5Nw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks integrated Cyber Security approach<\/a><\/p>\n<ul>\n<li>When: February 10, 2015 10:00 AM - 1:00 PM WET<\/li>\n<li>Where: Naarden<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzMQ==\" target=\"_blank\" rel=\"noopener\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>When: February 11, 2015 11:00 AM - 12:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1MA==\" target=\"_blank\" rel=\"noopener\">Avoiding Doom in the Data Center<\/a><\/p>\n<ul>\n<li>When: February 11, 2015 10:00 AM - 12:00 PM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg5NQ==\" target=\"_blank\" rel=\"noopener\">Next-Generation Firewall Performance Testing<\/a><\/p>\n<ul>\n<li>When: February 11, 2015 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg3Nw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: February 11, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg2OQ==\" target=\"_blank\" rel=\"noopener\">Transform Network Security With the Software Defined Data Center<\/a><\/p>\n<ul>\n<li>When: February 11, 2015 4:00 PM - 5:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk2Nw==\" target=\"_blank\" rel=\"noopener\">Demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva ta<\/a> [Finnish]<\/p>\n<ul>\n<li>When: February 12, 2015 1:00 PM - 2:00 PM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1MQ==\" target=\"_blank\" rel=\"noopener\">Opplev styrken i Next-Generation Brannmurer<\/a> [Norwegian]<\/p>\n<ul>\n<li>When: February 12, 2015 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzNg==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive \u2013 2015<\/a> [French]<\/p>\n<ul>\n<li>When: February 12, 2015 9:00 AM - 1:00 PM CET<\/li>\n<li>Where: Issy-les-Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgzOA==\" target=\"_blank\" rel=\"noopener\">2\u670813\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70(\u5927\u962a)<\/a> [Japanese]<\/p>\n<ul>\n<li>When: February 13, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5927\u962a\u5e02\u5317\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk3Ng==\" target=\"_blank\" rel=\"noopener\">Advanced Endpoint Protection - We're Changing the Game!<\/a><\/p>\n<ul>\n<li>When: February 17, 2015 10:00 AM - 11:00 AM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc3MQ==\" target=\"_blank\" rel=\"noopener\">2\u670818\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: February 18, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzMw==\" target=\"_blank\" rel=\"noopener\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>When: February 18, 2015 11:00 AM - 12:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1OA==\" target=\"_blank\" rel=\"noopener\">Moving Beyond Proxies<\/a><\/p>\n<ul>\n<li>When: February 18, 2015 2:00 PM - 3:00 PM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1NA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: February 18, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc4Mg==\" target=\"_blank\" rel=\"noopener\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: February 18, 2015 9:30 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkyMQ==\" target=\"_blank\" rel=\"noopener\">Join the Revolution: Advanced Endpoint Protection<\/a> [Italian]<\/p>\n<ul>\n<li>When: February 19, 2015 10:00 AM - 1:00 PM CET<\/li>\n<li>Where: Roma<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk2NA==\" target=\"_blank\" rel=\"noopener\">Next-Generation Firewall Live Demo Webinar<\/a> [Dutch]<\/p>\n<ul>\n<li>When: February 19, 2015 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzNw==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive \u2013 2015<\/a> [French]<\/p>\n<ul>\n<li>When: February 19, 2015 9:00 AM - 1:00 PM CET<\/li>\n<li>Where: Issy-les-Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkwMg==\" target=\"_blank\" rel=\"noopener\">You Can Have It All!<\/a><\/p>\n<ul>\n<li>When: February 19, 2015 8:30 AM - 11:00 AM EST<\/li>\n<li>Where: Ottawa, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyNA==\" target=\"_blank\" rel=\"noopener\">2\u670820\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: February 20, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Did everyone have a good first week of February? Check out all of the top Palo Alto Networks news from this past week. &nbsp; Unit 42 explains how best to protect your &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[834,1050,1059,1014,1058,396,589,778,495],"coauthors":[709],"class_list":["post-8127","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-cryptowall","tag-dyre","tag-facebook","tag-fic-2015","tag-filmkan","tag-ignite-2015","tag-meritalk","tag-traps","tag-videowave"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8127"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8127\/revisions"}],"predecessor-version":[{"id":128729,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8127\/revisions\/128729"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8127"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}