{"id":9820,"date":"2015-07-25T04:00:14","date_gmt":"2015-07-25T11:00:14","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9820"},"modified":"2015-12-08T17:14:20","modified_gmt":"2015-12-09T01:14:20","slug":"palo-alto-networks-news-of-the-week-july-25","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/07\/palo-alto-networks-news-of-the-week-july-25\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 July 25"},"content":{"rendered":"<p>We\u2019ve rounded up all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/news-of-the-week\" target=\"_blank\">Palo Alto Networks news<\/a> from this past week.<\/p>\n<p>Unit 42 <a href=\"http:\/\/bit.ly\/1MkStWc\" rel=\"nofollow,noopener\"  target=\"_blank\">discovered<\/a> a watering hole attack on the website of a well-known aerospace firm that exploits CVE-2015-5122 to install IsSpace backdoor.<\/p>\n<p>Sign up <a href=\"http:\/\/bit.ly\/1MgwIpx\" rel=\"nofollow,noopener\"  target=\"_blank\">here<\/a> to get all recent Unit 42 threat intelligence straight to your inbox.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7596 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png\" alt=\"blog-title-unit42\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-510x69.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-240x32.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png 632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p>Palo Alto Networks CEO Mark McLaughlin joined Becky Quick on CNBC Squawk Box today to <a href=\"http:\/\/bit.ly\/1HOYIgS\" rel=\"nofollow,noopener\"  target=\"_blank\">discuss<\/a> why cybersecurity should be a top priority for CEOs.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/mark_squawk.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:54.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9821 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/mark_squawk-500x271.png\" alt=\"mark_squawk\" width=\"500\" height=\"271\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/mark_squawk-500x271.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/mark_squawk-230x125.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/mark_squawk-510x277.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/mark_squawk-73x40.png 73w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/mark_squawk.png 526w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>In a new whitepaper, <a href=\"http:\/\/bit.ly\/1HzcGmZ\" rel=\"nofollow,noopener\"  target=\"_blank\">Building a Next-Generation Security Architecture<\/a>, Enterprise Strategy Group (ESG) shares insights into the challenges facing security today and provides detailed recommendations to bolster strategy and approach, including how to bring network, cloud and endpoint security together into a tightly integrated architecture.<\/p>\n<p>Jon Oltsik, a writer for Network World and Senior Principal Analyst for ESG, submitted a nomination for the Cybersecurity Canon! <a href=\"http:\/\/bit.ly\/1SAiKhS\" rel=\"nofollow,noopener\"  target=\"_blank\">Find out why<\/a> he thinks The Florentine Deception by Carey Nachenberg is a logical addition.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9648 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png\" alt=\"cybersec canon red\" width=\"500\" height=\"218\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-230x100.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-510x223.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-91x40.png 91w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png 786w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>We <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/07\/palo-alto-networks-and-the-virginia-governors-office-taking-cybersecurity-education-to-virginia-schools\/\" target=\"_blank\">recently partnered<\/a> with the Virginia Governor\u2019s office to help design the <em>Cybersecurity Education for High School Teachers<\/em> curriculum.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/virgina.gov_.png\"><div style=\"max-width:100%\" data-width=\"456\"><span class=\"ar-custom\" style=\"padding-bottom:23.9%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-9808 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/virgina.gov_.png\" alt=\"virgina.gov\" width=\"456\" height=\"109\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/virgina.gov_.png 456w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/virgina.gov_-230x54.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/virgina.gov_-167x40.png 167w\" sizes=\"auto, (max-width: 456px) 100vw, 456px\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"http:\/\/bit.ly\/1IgLNpA\" rel=\"nofollow,noopener\"  target=\"_blank\">This month's customer spotlight<\/a> focused on Austrian Airlines and how the company looks to Palo Alto Networks for first-class security performance.<\/p>\n<p><center><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/Austrian-Airlines.png\"><div style=\"max-width:100%\" data-width=\"250\"><span class=\"ar-custom\" style=\"padding-bottom:24%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-9785 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/Austrian-Airlines.png\" alt=\"Austrian Airlines\" width=\"250\" height=\"60\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/Austrian-Airlines.png 250w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/Austrian-Airlines-230x55.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/Austrian-Airlines-166x40.png 166w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/span><\/div><\/a><\/center>&nbsp;<\/p>\n<p>Know the unknown <a href=\"http:\/\/bit.ly\/1I8veYg\" rel=\"nofollow,noopener\"  target=\"_blank\">and check out effective prevention of and response to threats<\/a> from Palo Alto Networks.<\/p>\n<p>Vehicle hacks &amp; the age of IoT: Sebastian Goodwin <a href=\"http:\/\/bit.ly\/1Im6K4j\" rel=\"nofollow,noopener\"  target=\"_blank\">detailed<\/a> why breach prevention is the only way forward.<\/p>\n<p>How do businesses embrace the evolution of data centers without creating inconsistent security controls and gaps in security policy? <a href=\"http:\/\/bit.ly\/1Il9Aqf\" rel=\"nofollow,noopener\"  target=\"_blank\">Read our answer here<\/a>.<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzYzMw==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: July 29, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzcyNA==\">Your Agency Can Have it All<\/a><\/p>\n<ul>\n<li>When: July 30, 2015 8:30 AM - 1:30 PM EST<\/li>\n<li>Where: Reston, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzIxMg==\">7\u670831\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a>[Japanese]<\/p>\n<ul>\n<li>When: July 31, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzc2Mg==\">Design Best Practices for Micro-Segmentation<\/a><\/p>\n<ul>\n<li>When: July 31, 2015 11:00 AM - 2:00 PM EST<\/li>\n<li>Where: Worcester, MA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzc1Mw==\">8\u67084\u65e5(\u706b)Web\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: August 4, 2015 1:30 PM - 2:30 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY1Mw==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: August 5, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY5MQ==\">8\u67087\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: August 7, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzczNg==\">AWS\uff78\uff97\uff73\uff84\uff9e\u306b\u304a\u3051\u308b\u6b21\u4e16\u4ee3\uff7e\uff77\uff6d\uff98\uff83\uff68\u5b9f\u8df5\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: August 7, 2015 3:00 PM - 5:30 PM GMT+9:00<\/li>\n<li>Where: \u76ee\u9ed2\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzc2Mw==\">Design Best Practices for Micro-Segmentation<\/a><\/p>\n<ul>\n<li>When: August 7, 2015 11:00 AM - 2:00 PM EST<\/li>\n<li>Where: Newton, MA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzc1NQ==\">Die Zwei um Zw\u00f6lf: Best Practices User ID<\/a> [German]<\/p>\n<ul>\n<li>When: August 7, 2015 12:00 PM - 1:00 PM MEZ<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzc0MA==\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: August 7, 2015 11:00 AM - 1:00 PM PST<\/li>\n<li>Where: San Jose, CA<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve rounded up all of the top Palo Alto Networks news from this past week. Unit 42 discovered a watering hole attack on the website of a well-known aerospace firm that exploits &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[251,1332,1331],"coauthors":[709],"class_list":["post-9820","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-cybersecurity-canon","tag-enterprise-strategy-group","tag-squawk-box"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9820"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9820\/revisions"}],"predecessor-version":[{"id":11353,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9820\/revisions\/11353"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9820"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}