{"id":9369,"date":"2015-06-06T05:00:05","date_gmt":"2015-06-06T12:00:05","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9369"},"modified":"2021-03-22T07:36:13","modified_gmt":"2021-03-22T14:36:13","slug":"palo-alto-networks-news-of-the-week-june-6","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/06\/palo-alto-networks-news-of-the-week-june-6\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 June 6"},"content":{"rendered":"<p>Here\u2019s a look at <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/news-of-the-week\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a> and research analysis from the past week.<\/p>\n<p>&nbsp;<\/p>\n<p>Unit 42 <a href=\"http:\/\/bit.ly\/1Ju9E50\" target=\"_blank\" rel=\"noopener\">detailed a KeyBase keylogger malware family<\/a> after Palo Alto Networks AutoFocus threat intelligence service identified 295 unique samples over roughly 1,500 unique sessions in the past four months.<\/p>\n<p>Gal Badishi and Shlomi Levin <a href=\"http:\/\/bit.ly\/1FpPog9\" target=\"_blank\" rel=\"noopener\">analyzed the root cause<\/a> of a vulnerability we call CVE-2015-X, as well as a step-by-step explanation of how to trigger it.<!--more--><\/p>\n<p>We partnered with San Jose\u2019s Tech Museum of Innovation to launch Cyber Detectives, the first interactive exhibit on cybersecurity in the United States. <a href=\"http:\/\/bit.ly\/1KRfwaz\" target=\"_blank\" rel=\"noopener\">Learn more here<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/0C8A0718.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9367 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/0C8A0718-500x333.jpg\" alt=\"0C8A0718\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/0C8A0718-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/0C8A0718-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/0C8A0718-450x300.jpg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/0C8A0718-60x40.jpg 60w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Tim Treat <a href=\"http:\/\/bit.ly\/1EPt4uC\" target=\"_blank\" rel=\"noopener\">discussed how using Active Isolation<\/a> could counter cyber attacks and save lives.<\/p>\n<p>Yiftach Keshet <a href=\"http:\/\/bit.ly\/1dcXukw%5d\" target=\"_blank\" rel=\"noopener\">examined threat prevention vs. detection<\/a> in light of the global cyber skills shortage.<\/p>\n<p>The Palo Alto Networks Live Community Discussion Forum is a place where you can connect with your peers to share best practices, experiences and knowledge. <a href=\"http:\/\/bit.ly\/1Fs7QVe\" target=\"_blank\" rel=\"noopener\">Check out this example<\/a> of some of the great information you may find when you take part in the community.<\/p>\n<p>A good cybersecurity strategy for industrial control systems (ICS) must include both a systematic approach to patch management and compensating cybersecurity controls for when patching is not an option. <a href=\"http:\/\/bit.ly\/1FPZtFs\" target=\"_blank\" rel=\"noopener\">Find out what you need to know in our on-demand webinar here<\/a>.<\/p>\n<p>We had a great time at Infosecurity Europe in London. Thanks to everyone who made it so! <a href=\"http:\/\/bit.ly\/1dhowr8\" target=\"_blank\" rel=\"noopener\">Here\u2019s a look back at the week<\/a>.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1HAn7E6\" target=\"_blank\" rel=\"noopener\">Become a member<\/a> of the Fuel User Group and gain access to the members-only Resource Center which contains both new and archived webcasts, presentations, technical papers and articles about all things cybersecurity. \u00a0You\u2019ll also get a special discount when you register to attend <a href=\"http:\/\/bit.ly\/1Ht0LJT\" target=\"_blank\" rel=\"noopener\">Fuel\u2019s Spark User Summits<\/a> held around the world. The next two are scheduled for <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/06\/hear-about-the-latest-palo-alto-networks-breakthroughs-at-upcoming-spark-user-summits\/\" target=\"_blank\" rel=\"noopener\">June 23 in Toronto<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/06\/hear-about-the-latest-palo-alto-networks-breakthroughs-at-upcoming-spark-user-summits\/\" target=\"_blank\" rel=\"noopener\">June 25 in Houston<\/a>.<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM1MQ==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 9, 2015 11:00 AM - 1:00 PM PST<\/li>\n<li>Where: Phoenix, AZ<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzAyOQ==\" target=\"_blank\" rel=\"noopener\">SalesWave\/TechWave Partner Series by Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 9, 2015 11:30 AM - 6:30 PM CET<\/li>\n<li>Where: Bruxelles, Bruxelles<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzUwNA==\" target=\"_blank\" rel=\"noopener\">Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 10, 2015 11:30 AM - 1:30 PM CST<\/li>\n<li>Where: San Antonio, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzI4NQ==\" target=\"_blank\" rel=\"noopener\">Demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva tarkoittaa k\u00e4yt\u00e4nn\u00f6ss\u00e4<\/a><\/p>\n<ul>\n<li>When: June 10, 2015 1:00 PM - 2:00 PM EET<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQ3MQ==\" target=\"_blank\" rel=\"noopener\">Evolving Threat Landscape with Portal IT<\/a><\/p>\n<ul>\n<li>When: June 10, 2015 12:00 PM - 1:30 PM GMT+8:00<\/li>\n<li>Where: Perth, WA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM1Mg==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 10, 2015 11:00 AM - 1:00 PM PST<\/li>\n<li>Where: South Las Vegas, NV<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM3Ng==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 10, 2015 11:00 AM - 1:00 PM MST<\/li>\n<li>Where: Calgary, AB<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM2Mg==\" target=\"_blank\" rel=\"noopener\">Next-Generation Network Security Seminar<\/a><\/p>\n<ul>\n<li>When: June 10, 2015 11:30 AM - 1:00 PM MST<\/li>\n<li>Where: Denver, CO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQ4OQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: June 10, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzAzMA==\" target=\"_blank\" rel=\"noopener\">SalesWave\/TechWave Partner Series by Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 10, 2015 11:30 AM - 6:00 PM CET<\/li>\n<li>Where: Den Haag<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQzOQ==\" target=\"_blank\" rel=\"noopener\">Security Summit - Clusit<\/a><\/p>\n<ul>\n<li>When: June 10, 2015 9:00 AM - 6:00 PM CET<\/li>\n<li>Where: Roma, Roma<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQ1Nw==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive \u2013 Next Generation Firewall<\/a><\/p>\n<ul>\n<li>When: June 10, 2015 9:00 AM - 1:00 PM EST<\/li>\n<li>Where: Reston, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzUwMw==\" target=\"_blank\" rel=\"noopener\">Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 11, 2015 11:30 AM - 4:00 PM CST<\/li>\n<li>Where: Austin, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM3OA==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 11, 2015 11:00 AM - 1:00 PM PST<\/li>\n<li>Where: Vancouver, BC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQ1Ng==\" target=\"_blank\" rel=\"noopener\">NSX Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: June 11, 2015 8:30 AM - 1:30 PM CET<\/li>\n<li>Where: Z\u00fcrich<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzMyMQ==\" target=\"_blank\" rel=\"noopener\">Public Sector Technical Workshop - Windsor<\/a><\/p>\n<ul>\n<li>When: June 11, 2015 8:00 AM - 11:00 AM EST<\/li>\n<li>Where: Windsor, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzAzMQ==\" target=\"_blank\" rel=\"noopener\">SalesWave\/TechWave Partner Series by Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 11, 2015 11:30 AM - 6:00 PM CET<\/li>\n<li>Where: Kista<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzUxNQ==\" target=\"_blank\" rel=\"noopener\">Spring into Summer with the Hottest Technology!<\/a><\/p>\n<ul>\n<li>When: June 11, 2015 11:30 AM - 2:30 PM EST<\/li>\n<li>Where: Hartford, CT<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzUzNw==\" target=\"_blank\" rel=\"noopener\">UTD &amp; Security Day Next Generation Firewall, Peru<\/a><\/p>\n<ul>\n<li>When: June 11, 2015 10:00 AM - 2:00 PM CST<\/li>\n<li>Where: La Victoria<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzU3MA==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 15, 2015 4:00 PM - 7:00 PM CST<\/li>\n<li>Where: Milwaukee, WI<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM0NQ==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 16, 2015 11:00 AM - 1:00 PM CST<\/li>\n<li>Where: Omaha, NE<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM0Ng==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 16, 2015 11:00 AM - 1:00 PM PST<\/li>\n<li>Where: Portland, OR<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQzMw==\" target=\"_blank\" rel=\"noopener\">Join Unit 42 and Uncover a New Source of Cyberthreats - Ottawa<\/a><\/p>\n<ul>\n<li>When: June 16, 2015 8:00 AM - 10:30 AM EST<\/li>\n<li>Where: Ottawa, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzUwOA==\" target=\"_blank\" rel=\"noopener\">Take the Ultimate Test Drive!<\/a><\/p>\n<ul>\n<li>When: June 16, 2015 8:30 AM - 2:00 PM EST<\/li>\n<li>Where: Burlington, MA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzUzMg==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Brisbane<\/a><\/p>\n<ul>\n<li>When: June 16, 2015 8:30 AM - 12:30 PM (GMT + 10:00) Brisbane<\/li>\n<li>Where: Brisbane, QLD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzIxNw==\" target=\"_blank\" rel=\"noopener\">6\u670817\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: June 17, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzUyNg==\" target=\"_blank\" rel=\"noopener\">Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 17, 2015 1:00 PM - 5:00 PM CST<\/li>\n<li>Where: The Colony, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQzOA==\" target=\"_blank\" rel=\"noopener\">Cyber-Crime Conference<\/a> [Italian]<\/p>\n<ul>\n<li>When: June 17, 2015 9:00 AM - 5:00 PM CET<\/li>\n<li>Where: Roma, Roma<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM0NA==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 17, 2015 11:00 AM - 1:00 PM CST<\/li>\n<li>Where: Kansas City, MO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM0Nw==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 17, 2015 11:00 AM - 1:00 PM PST<\/li>\n<li>Where: Seattle , WA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQyNg==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 17, 2015 11:00 AM - 4:00 PM CST<\/li>\n<li>Where: Spring, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQzNA==\" target=\"_blank\" rel=\"noopener\">Join Unit 42 and Uncover a New Source of Cyberthreats \u2013 Montreal<\/a><\/p>\n<ul>\n<li>When: June 17, 2015 8:00 AM - 10:30 AM EST<\/li>\n<li>Where: Montreal, QC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzU3Nw==\" target=\"_blank\" rel=\"noopener\">Lunch &amp; Learn Rethinking Mobile Security<\/a><\/p>\n<ul>\n<li>When: June 17, 2015 12:30 PM - 2:00 PM GMT+10:00<\/li>\n<li>Where: Melbourne, VIC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQ1Mg==\" target=\"_blank\" rel=\"noopener\">Malware and Minor League Baseball<\/a><\/p>\n<ul>\n<li>When: June 17, 2015 5:00 PM - 8:00 PM EST<\/li>\n<li>Where: New Britain, CT<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQ5MA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: June 17, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzMyMg==\" target=\"_blank\" rel=\"noopener\">Public Sector Technical Workshop \u2013 GTA<\/a><\/p>\n<ul>\n<li>When: June 17, 2015 8:00 AM - 11:00 AM EST<\/li>\n<li>Where: Toronto, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg5MQ==\" target=\"_blank\" rel=\"noopener\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: June 17, 2015 10:00 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzI4OQ==\" target=\"_blank\" rel=\"noopener\">Firewall Einsatzm\u00f6glichkeiten<\/a> [German]<\/p>\n<ul>\n<li>When: June 18, 2015 11:00 AM - 12:00 PM CET<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM0Mw==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 18, 2015 11:00 AM - 1:00 PM CST<\/li>\n<li>Where: Creve Coeur, MO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzU3NQ==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive - Cyber Threat Prevention<\/a><\/p>\n<ul>\n<li>When: June 18, 2015 9:00 AM - 1:00 PM EST<\/li>\n<li>Where: Reston, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzIwOQ==\" target=\"_blank\" rel=\"noopener\">6\u670819\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a><\/p>\n<ul>\n<li>When: June 19, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzU3Ng==\" target=\"_blank\" rel=\"noopener\">Lunch &amp; Learn Rethinking Mobile Security<\/a><\/p>\n<ul>\n<li>When: June 19, 2015 12:30 PM - 2:00 PM GMT+10:00<\/li>\n<li>Where: North Sydney, NSW<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzUzMQ==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Melbourne<\/a><\/p>\n<ul>\n<li>When: June 19, 2015 9:00 AM - 12:30 PM GMT+10:00<\/li>\n<li>Where: Melbourne, VIC<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a look at Palo Alto Networks news and research analysis from the past week. &nbsp; Unit 42 detailed a KeyBase keylogger malware family after Palo Alto Networks AutoFocus threat intelligence service &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1227,427,1223,1206,1219,1220,1135],"coauthors":[709],"class_list":["post-9369","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-cyber-detectives","tag-infosecurity-europe","tag-keybase","tag-live-community-discussion-forum","tag-spark-houston","tag-spark-toronto","tag-spark-user-summit"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9369"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9369\/revisions"}],"predecessor-version":[{"id":128763,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9369\/revisions\/128763"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9369"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}