{"id":9957,"date":"2015-08-15T05:00:15","date_gmt":"2015-08-15T12:00:15","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9957"},"modified":"2021-03-22T08:37:18","modified_gmt":"2021-03-22T15:37:18","slug":"palo-alto-networks-news-of-the-week-august-15","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/08\/palo-alto-networks-news-of-the-week-august-15\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 August 15"},"content":{"rendered":"<p>Check out the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/news-of-the-week\">Palo Alto Networks news<\/a> from the past week right here.<\/p>\n<p>Unit 42\u2019s Ryan Olson discussed the question: <a href=\"http:\/\/bit.ly\/1gPSGnG\" target=\"_blank\" rel=\"noopener\">What\u2019s next in malware after Kuluoz<\/a>?<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kuluoz.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9916 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kuluoz-500x121.png\" alt=\"kuluoz\" width=\"500\" height=\"121\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kuluoz-500x121.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kuluoz-230x56.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kuluoz-510x123.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kuluoz-165x40.png 165w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kuluoz.png 1091w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p>Another Black Hat USA is in the books! <a href=\"http:\/\/bit.ly\/1NqrTIF\" target=\"_blank\" rel=\"noopener\">Here\u2019s what<\/a> members of Unit 42 highlighted as key discussions from the week.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/unit-42-at-BH.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:55.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9958 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/unit-42-at-BH-500x278.png\" alt=\"unit 42 at BH\" width=\"500\" height=\"278\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/unit-42-at-BH-500x278.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/unit-42-at-BH-230x128.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/unit-42-at-BH-510x283.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/unit-42-at-BH-72x40.png 72w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/unit-42-at-BH.png 627w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Christin Ayiotis reviewed the newest Cybersecurity Canon nominee, \u201c<a href=\"http:\/\/bit.ly\/1ITDeg9\" target=\"_blank\" rel=\"noopener\">@War: The Rise of the Military-Internet Complex<\/a>\u201d by Shane Harris.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9648 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png\" alt=\"cybersec canon red\" width=\"500\" height=\"218\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-230x100.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-510x223.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-91x40.png 91w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png 786w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>In a recent interview with CIO Asia, Rene Bonvanie, Palo Alto Networks CMO, <a href=\"http:\/\/bit.ly\/1h7vrFH\" target=\"_blank\" rel=\"noopener\">discussed<\/a> the important relationship between the CIO and CMO roles and using technology to foster collaboration and growth.<\/p>\n<p>Stephen Perciballi <a href=\"http:\/\/bit.ly\/1NooEBu\" target=\"_blank\" rel=\"noopener\">detailed<\/a> design correlation rules to get the most out of your SIEM implementation.<\/p>\n<p>Find out what Del Rodillas said on the topic of staying secure when ICS patching is not an option in <a href=\"http:\/\/bit.ly\/1NehD8p\" target=\"_blank\" rel=\"noopener\">this Utility Week article<\/a>.<\/p>\n<p>In this latest Lightboard session, Kate Taylor <a href=\"http:\/\/bit.ly\/1HEr8qt\" target=\"_blank\" rel=\"noopener\">demonstrated<\/a> Palo Alto Networks multi-layered approach to advanced threat detection.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kate-taylor-lightboard.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:53.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9959 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kate-taylor-lightboard-500x268.png\" alt=\"kate taylor lightboard\" width=\"500\" height=\"268\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kate-taylor-lightboard-500x268.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kate-taylor-lightboard-230x123.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kate-taylor-lightboard-510x274.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kate-taylor-lightboard-75x40.png 75w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/kate-taylor-lightboard.png 585w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"http:\/\/bit.ly\/1TgGk95\" target=\"_blank\" rel=\"noopener\">Customer Spotlight Video<\/a>: Bob Williamson, Network Administrator at Annie Wright Schools talked about why Palo Alto Networks is making a difference when it comes to securing access for hundreds of students and thousands of devices.<\/p>\n<p>This <a href=\"http:\/\/bit.ly\/1h0Vsqo\" target=\"_blank\" rel=\"noopener\">slideshow from eWeek showed<\/a> how enterprises can break the Cyber Attack Lifecycle.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/cyber-attack-lifecycle.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:80.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9941 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/cyber-attack-lifecycle-500x401.png\" alt=\"cyber attack lifecycle\" width=\"500\" height=\"401\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/cyber-attack-lifecycle-500x401.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/cyber-attack-lifecycle-230x184.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/cyber-attack-lifecycle-374x300.png 374w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/cyber-attack-lifecycle-50x40.png 50w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/cyber-attack-lifecycle.png 646w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Registration is <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/08\/registration-is-live-for-spark-user-summit-amsterdam\/\" target=\"_blank\" rel=\"noopener\">open<\/a> for Spark User Summit Amsterdam!<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark-amsterdam.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:63.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9954 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark-amsterdam-500x317.jpg\" alt=\"spark amsterdam\" width=\"500\" height=\"317\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark-amsterdam-500x317.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark-amsterdam-230x146.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark-amsterdam-474x300.jpg 474w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark-amsterdam-63x40.jpg 63w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/spark-amsterdam.jpg 668w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzc3MA==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: August 19, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyMA==\">Extending Zero Trust to the Endpoint<\/a><\/p>\n<ul>\n<li>When: August 25, 2015 11:00 AM - 12:00 PM GMT+4:00<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyMw==\">Mobile Threat Workshop \u2013 Omaha<\/a><\/p>\n<ul>\n<li>When: August 25, 2015 11:30 AM - 1:30 PM CST<\/li>\n<li>Where: Omaha, NE<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg0OA==\">UTD Threat Prevention Integratium<\/a> [Spanish]<\/p>\n<ul>\n<li>When: August 25, 2015 8:00 AM - 1:00 PM CST<\/li>\n<li>Where: M\u00e9rida, Yucat\u00e1n<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg1Mg==\">UTD Threat Prevention Integratium vespertino<\/a> [Spanish]<\/p>\n<ul>\n<li>When: August 25, 2015 2:00 PM - 7:00 PM CST<\/li>\n<li>Where: M\u00e9rida, Yucat\u00e1n<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyOA==\">Mobile Threat Workshop - St. Louis<\/a><\/p>\n<ul>\n<li>When: August 26, 2015 11:30 AM - 1:30 PM CST<\/li>\n<li>Where: St. Louis, MO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyMQ==\">Palo Alto Networks Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: August 26, 2015 7:00 AM - 11:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzc3MQ==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: August 26, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg0Mw==\">\u7b2c\u4e00\u56de\u8a8d\u5b9a\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0 (8\/26\uff5e27)<\/a> [Japanese]<\/p>\n<ul>\n<li>When: August 26, 2015 10:00 AM - 6:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzcwMQ==\">8\u670828\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: August 28, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Check out the top Palo Alto Networks news from the past week right here. Unit 42\u2019s Ryan Olson discussed the question: What\u2019s next in malware after Kuluoz?<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[928,1201,1366,470],"coauthors":[709],"class_list":["post-9957","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-annie-wright-schools","tag-cyber-attack-lifecycle","tag-eweek","tag-kuluoz"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9957"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9957\/revisions"}],"predecessor-version":[{"id":128783,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9957\/revisions\/128783"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9957"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}