{"id":10799,"date":"2015-10-30T05:00:32","date_gmt":"2015-10-30T12:00:32","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=10799"},"modified":"2015-10-30T10:55:39","modified_gmt":"2015-10-30T17:55:39","slug":"channel-scoop-october-30-2015","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/10\/channel-scoop-october-30-2015\/","title":{"rendered":"Channel Scoop \u2013 October 30, 2015"},"content":{"rendered":"<p>With one day left in the quarter, today\u2019s blog post will be a short channel scoop.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/channel-scoop\/\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-10802 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\" alt=\"PAN_ChannelScoop_Blog\" width=\"498\" height=\"269\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg 498w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-230x124.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p><!--more--><\/p>\n<ul>\n<li>In the words of the famous Yogi Berra, \u201cIt ain\u2019t over till it's over.\u201d<\/li>\n<li>Have a customer that needs a little more data on why they should invest in security prevention? This week the Cyber Threat Alliance, co-founded by Palo Alto Networks, Fortinet, Intel Security and Symantec, released its first joint research effort, revealing one of the most lucrative ($325M) and widespread (400,000 attempts seen by Cyber Threat Alliance customers) ransomeware attacks ever identified (CryptoWall version 3). Invite your customers to learn more by reading the <a href=\"http:\/\/cyberthreatalliance.org\/cryptowall-executive-summary.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">Lucrative Ransomware Attacks: Analysis of the Cryptowall Version 3 Threat<\/a> report or downloading the <a href=\"http:\/\/cyberthreatalliance.org\/cryptowall-infographic-stats-full.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">infographic<\/a> for an overview.<\/li>\n<li>Have a security opportunity with a customer that wants to better understand today\u2019s point of sale threats? Josh Grunzweig\u2019s recent blog on <em>Understanding and Preventing Point of Sale Attacks <\/em>could give you exactly what you need. <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/10\/understanding-and-preventing-point-of-sale-attacks\/\" target=\"_blank\">Read the blog<\/a>.<\/li>\n<li>Have a rapidly growing customer that needs to consider infrastructure scale in their security purchase decision? <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/10\/security-infrastructure-what-to-think-about-when-youre-thinking-about-scale\/\" target=\"_blank\">Check out the recent blog<\/a> by Jonathan Lewis, <em>On What to Think about When You\u2019re Thinking about Scale. <\/em><\/li>\n<\/ul>\n<p>What topics you\u2019d like the scoop on next? Let us know by commenting on this blog.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With one day left in the quarter, today\u2019s blog post will be a short channel scoop.<\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1514,78],"tags":[834,662,1520],"coauthors":[1373],"class_list":["post-10799","post","type-post","status-publish","format-standard","hentry","category-channel-scoop","category-partners","tag-cryptowall","tag-cyber-threat-alliance","tag-scale"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=10799"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10799\/revisions"}],"predecessor-version":[{"id":10806,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10799\/revisions\/10806"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=10799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=10799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=10799"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=10799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}