{"id":9497,"date":"2015-06-20T05:00:06","date_gmt":"2015-06-20T12:00:06","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9497"},"modified":"2021-03-22T07:41:17","modified_gmt":"2021-03-22T14:41:17","slug":"palo-alto-networks-news-of-the-week-june-20","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/06\/palo-alto-networks-news-of-the-week-june-20\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 June 20"},"content":{"rendered":"<p>Here is all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/news-of-the-week\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a> from this past week.<\/p>\n<p>&nbsp;<\/p>\n<p>Unit 42 <a href=\"http:\/\/bit.ly\/1G8OvYP\" target=\"_blank\" rel=\"noopener\">published new research identifying a persistent cyber espionage campaign<\/a>, which the team named \u201cOperation Lotus Blossom.\u201d \u00a0Relying heavily on spearphishing emails, Operation Lotus Blossom targeted government and military organizations in Southeast Asia over the past three years. Unit 42's Scott Simkin explains more in <a href=\"http:\/\/bit.ly\/1BmozgB\" target=\"_blank\" rel=\"noopener\">this video<\/a>, and <a href=\"http:\/\/bit.ly\/1Gfupfx\" target=\"_blank\" rel=\"noopener\">check out this infographic<\/a> to see key findings from the campaign, and the basic characteristics of the attacks.<!--more--><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/PANW_Lotus_Infographic_Mini_Social_Twitter2.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:50%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9498 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/PANW_Lotus_Infographic_Mini_Social_Twitter2-500x250.jpg\" alt=\"PANW_Lotus_Infographic_Mini_Social_Twitter[2]\" width=\"500\" height=\"250\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/PANW_Lotus_Infographic_Mini_Social_Twitter2-500x250.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/PANW_Lotus_Infographic_Mini_Social_Twitter2-230x115.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/PANW_Lotus_Infographic_Mini_Social_Twitter2-510x255.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/PANW_Lotus_Infographic_Mini_Social_Twitter2-79x40.jpg 79w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/PANW_Lotus_Infographic_Mini_Social_Twitter2.jpg 1833w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>As part of our <a href=\"http:\/\/bit.ly\/1GmAHy6\" target=\"_blank\" rel=\"noopener\">PAN-OS 7.0 release<\/a> last week, the <a href=\"http:\/\/bit.ly\/1I9Kdl4\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Technical Publications team provided solution-based documentation<\/a> that can help you use the new features to solve real-world network security problems. For example, you can now take advantage of <a href=\"http:\/\/bit.ly\/1MIWlgB\" target=\"_blank\" rel=\"noopener\">many new Panorama features<\/a> designed to simplify policy and device management.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated.png\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:62.45%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-8715 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated.png\" alt=\"tech doc updated\" width=\"498\" height=\"311\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated.png 498w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated-230x143.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated-480x300.png 480w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated-64x40.png 64w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>Jonathan Lewis <a href=\"http:\/\/bit.ly\/1FX9Ncz\" target=\"_blank\" rel=\"noopener\">discussed<\/a> the four key elements of security for the software-defined data center.<\/p>\n<p>Cloud Security Alliance &amp; Palo Alto Networks <a href=\"http:\/\/bit.ly\/1LfuDHH\" target=\"_blank\" rel=\"noopener\">released security considerations for private versus public clouds<\/a>.<\/p>\n<p>BYOD makes you productive, and it\u2019s also why your NAC deployments fail. Stephen Perciballi <a href=\"http:\/\/bit.ly\/1GQ4kbj\" target=\"_blank\" rel=\"noopener\">explained how to avoid this problem<\/a> using Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/products\/technologies\/globalprotect.html\" target=\"_blank\" rel=\"noopener\">GlobalProtect<\/a>.<img loading=\"lazy\" decoding=\"async\"  class=\"alignright wp-image-9481 size-thumbnail lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/interop-best-100x100.png\" alt=\"interop best\" width=\"100\" height=\"100\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/interop-best-100x100.png 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/interop-best-41x40.png 41w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/interop-best-32x32.png 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/interop-best-64x64.png 64w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/interop-best-96x96.png 96w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/interop-best-128x128.png 128w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/p>\n<p>Palo Alto Networks <a href=\"http:\/\/bit.ly\/1Sw8TvA\" target=\"_blank\" rel=\"noopener\">won Best of Show award<\/a> at Interop Tokyo 2015.<\/p>\n<p>Join Scott Simkin, Senior Manager in the Global Cybersecurity group at Palo Alto Networks, in Australia next week <a href=\"http:\/\/bit.ly\/1GRXulJ\" target=\"_blank\" rel=\"noopener\">at one of our Crack the Code events<\/a> for a discussion on how you can architect your organization for prevention, while planning for detection.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/9aa1092d-73bc-42fa-8dd7-e3336b55e5c7_PAN_Threat_CracktheCode_banner_660x200.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:30.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9491 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/9aa1092d-73bc-42fa-8dd7-e3336b55e5c7_PAN_Threat_CracktheCode_banner_660x200-500x151.jpg\" alt=\"{9aa1092d-73bc-42fa-8dd7-e3336b55e5c7}_PAN_Threat_CracktheCode_banner_660x200\" width=\"500\" height=\"151\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/9aa1092d-73bc-42fa-8dd7-e3336b55e5c7_PAN_Threat_CracktheCode_banner_660x200-500x151.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/9aa1092d-73bc-42fa-8dd7-e3336b55e5c7_PAN_Threat_CracktheCode_banner_660x200-230x69.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/9aa1092d-73bc-42fa-8dd7-e3336b55e5c7_PAN_Threat_CracktheCode_banner_660x200-510x154.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/9aa1092d-73bc-42fa-8dd7-e3336b55e5c7_PAN_Threat_CracktheCode_banner_660x200-132x40.jpg 132w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/9aa1092d-73bc-42fa-8dd7-e3336b55e5c7_PAN_Threat_CracktheCode_banner_660x200.jpg 660w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Unit 42 is on the road this month! Next week Palo Alto Networks CSO Rick Howard will be in Brazil. <a href=\"http:\/\/bit.ly\/1dxvics\" target=\"_blank\" rel=\"noopener\">You can find details here<\/a> on where, when, and how to attend one of the events.<\/p>\n<p>Fuel User Group announced that fees for Spark User Summit Toronto &amp; Spark User Summit Houston have been waived. <a href=\"http:\/\/bit.ly\/1BoDXsH\" target=\"_blank\" rel=\"noopener\">Register today<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"472\"><span class=\"ar-custom\" style=\"padding-bottom:35.59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-9312 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/spark-toronto-houston.png\" alt=\"spark toronto houston\" width=\"472\" height=\"168\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/spark-toronto-houston.png 472w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/spark-toronto-houston-230x81.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/spark-toronto-houston-112x40.png 112w\" sizes=\"auto, (max-width: 472px) 100vw, 472px\" \/><\/span><\/div><\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYxNg==\" target=\"_blank\" rel=\"noopener\">Fogo de Chao em Sao Paulo - Jun 23<\/a> [Portuguese]<\/p>\n<ul>\n<li>When: June 23, 2015 11:00 AM - 3:00 PM GMT-3:00<\/li>\n<li>Where: S\u00e3o Paulo<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM0Mg==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 23, 2015 11:00 AM - 1:00 PM MST<\/li>\n<li>Where: Englewood, CO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzUxOA==\" target=\"_blank\" rel=\"noopener\">Security Considerations for Private vs. Public Clouds<\/a><\/p>\n<ul>\n<li>When: June 23, 2015 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYwMw==\" target=\"_blank\" rel=\"noopener\">Take the Ultimate Test Drive!<\/a><\/p>\n<ul>\n<li>When: June 23, 2015 9:00 AM - 2:00 PM EST<\/li>\n<li>Where: Rocky Hill, CT<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYyMg==\" target=\"_blank\" rel=\"noopener\">Threat Seminar Rio - Jun 23<\/a> [Portuguese]<\/p>\n<ul>\n<li>When: June 23, 2015 9:00 AM - 1:00 PM GMT-3:00<\/li>\n<li>Where: Andar-Centro, RJ<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzIxMA==\" target=\"_blank\" rel=\"noopener\">6\u670824\u65e5(\u6c34)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a>[Japanese]<\/p>\n<ul>\n<li>When: June 24, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzU3Mw==\" target=\"_blank\" rel=\"noopener\">Crack the Code<\/a><\/p>\n<ul>\n<li>When: June 24, 2015 12:30 PM - 2:00 PM GMT+10:00<\/li>\n<li>Where: Melbourne, VIC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYxOA==\" target=\"_blank\" rel=\"noopener\">Fogo de Chao em Brasilia- Jun 24<\/a> [Portuguese]<\/p>\n<ul>\n<li>When: June 24, 2015 12:00 PM - 3:00 PM GMT-3:00<\/li>\n<li>Where: Distrito Federal \u2022 DF (Brasilia)<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM0OQ==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 24, 2015 11:00 AM - 1:00 PM CST<\/li>\n<li>Where: West Des Moines, IA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQ3Mw==\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 24, 2015 11:00 AM - 1:00 PM EST<\/li>\n<li>Where: New York, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM1OQ==\" target=\"_blank\" rel=\"noopener\">Next-Generation Network Security Seminar<\/a><\/p>\n<ul>\n<li>When: June 24, 2015 11:30 AM - 1:00 PM CST<\/li>\n<li>Where: Rosemont, IL<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzUzOA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: June 24, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY1MA==\" target=\"_blank\" rel=\"noopener\">Security Focused Happy Hour!<\/a><\/p>\n<ul>\n<li>When: June 24, 2015 5:00 PM - 8:00 PM EST<\/li>\n<li>Where: Burlington, VT<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzE4OA==\" target=\"_blank\" rel=\"noopener\">6\u670825\u65e5\uff08\u6728\uff09NextWave\uff8a\uff9f\uff70\uff84\uff85\uff70\u69d8\u5411\u3051\u8ca9\u58f2\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: June 25, 2015 2:00 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzU4Nw==\" target=\"_blank\" rel=\"noopener\">Adaptive Communications &amp; Palo Alto Networks 5 Year Anniversary Event!<\/a><\/p>\n<ul>\n<li>When: June 25, 2015 6:30 PM - 10:00 PM EST<\/li>\n<li>Where: Boston, MA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzU3OA==\" target=\"_blank\" rel=\"noopener\">Crack the Code<\/a><\/p>\n<ul>\n<li>When: June 25, 2015 12:30 PM - 2:00 PM (GMT + 10:00) Brisbane<\/li>\n<li>Where: Brisbane, QLD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzU0NA==\" target=\"_blank\" rel=\"noopener\">Everything you need to know about Windows 2003 End of Support<\/a><\/p>\n<ul>\n<li>When: June 25, 2015 8:00 AM - 9:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYyMQ==\" target=\"_blank\" rel=\"noopener\">Fogo de Chao em Rio- Jun 25<\/a> [Portuguese]<\/p>\n<ul>\n<li>When: June 25, 2015 12:00 PM - 3:00 PM GMT-3:00<\/li>\n<li>Where: Rio de Janeiro \u2022 RJ<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM0OA==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 25, 2015 11:00 AM - 1:00 PM PST<\/li>\n<li>Where: San Jose, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzQ3NA==\" target=\"_blank\" rel=\"noopener\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 25, 2015 11:00 AM - 1:00 PM EST<\/li>\n<li>Where: Parsippany, NJ<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzUyMQ==\" target=\"_blank\" rel=\"noopener\">Take The Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: June 25, 2015 8:30 AM - 1:30 PM EST<\/li>\n<li>Where: Oakville, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYyOQ==\" target=\"_blank\" rel=\"noopener\">UTD Threat Westcon morning session<\/a> [Portuguese]<\/p>\n<ul>\n<li>When: June 25, 2015 9:00 AM - 1:00 PM GMT-3:00<\/li>\n<li>Where: Sao Paulo\u2013 SP<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYyOA==\" target=\"_blank\" rel=\"noopener\">UTD Threat Westcon evening session<\/a> [Portuguese]<\/p>\n<ul>\n<li>When: June 25, 2015 2:00 PM - 6:00 PM GMT-3:00<\/li>\n<li>Where: Sao Paulo\u2013 SP<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzIyMQ==\" target=\"_blank\" rel=\"noopener\">6\u670826\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: June 26, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzU3Mg==\" target=\"_blank\" rel=\"noopener\">Crack the Code<\/a><\/p>\n<ul>\n<li>When: June 26, 2015 8:00 AM - 9:30 AM GMT+10:00<\/li>\n<li>Where: Sydney, NSW<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY2Mw==\" target=\"_blank\" rel=\"noopener\">Introduction to Palo Alto Networks Next Generation Firewalls<\/a><\/p>\n<ul>\n<li>When: June 26, 2015 10:00 AM - 6:00 PM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYwNg==\" target=\"_blank\" rel=\"noopener\">Industrial Control Systems Cybersecurity Workshop<\/a><\/p>\n<ul>\n<li>When: June 29, 2015 9:30 AM - 1:30 PM CST<\/li>\n<li>Where: Dallas, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYwOA==\" target=\"_blank\" rel=\"noopener\">Industrial Control Systems Cybersecurity Workshop<\/a><\/p>\n<ul>\n<li>When: June 30, 2015 9:30 AM - 1:30 PM CST<\/li>\n<li>Where: Houston, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzM1NA==\" target=\"_blank\" rel=\"noopener\">Next-Generation Network Security Seminar<\/a><\/p>\n<ul>\n<li>When: June 30, 2015 11:30 AM - 1:00 PM CST<\/li>\n<li>Where: Kansas City, MO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYwOQ==\" target=\"_blank\" rel=\"noopener\">Industrial Control Systems Cybersecurity Workshop<\/a><\/p>\n<ul>\n<li>When: July 1, 2015 9:30 AM - 1:30 PM CST<\/li>\n<li>Where: Tulsa, OK<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzU0MA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: July 1, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYxMg==\" target=\"_blank\" rel=\"noopener\">Security Day FEMSA Jul 1<\/a> [Spanish]<\/p>\n<ul>\n<li>When: July 1, 2015 8:30 AM - 11:30 AM CST<\/li>\n<li>Where: Monterrey, NL<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzIxMQ==\" target=\"_blank\" rel=\"noopener\">7\u67083\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: July 3, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here is all of the top Palo Alto Networks news from this past week. &nbsp; Unit 42 published new research identifying a persistent cyber espionage campaign, which the team named \u201cOperation Lotus &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1255,1254,1241,1230,1219,1220,1135],"coauthors":[709],"class_list":["post-9497","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-crack-the-code","tag-interop-tokyo","tag-lotus-blossom","tag-pan-os-7-0","tag-spark-houston","tag-spark-toronto","tag-spark-user-summit"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9497"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9497\/revisions"}],"predecessor-version":[{"id":128766,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9497\/revisions\/128766"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9497"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}