{"id":11107,"date":"2015-11-28T05:00:42","date_gmt":"2015-11-28T13:00:42","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11107"},"modified":"2015-12-11T10:23:00","modified_gmt":"2015-12-11T18:23:00","slug":"palo-alto-networks-news-of-the-week-november-28","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/11\/palo-alto-networks-news-of-the-week-november-28\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 November 28"},"content":{"rendered":"<p>Enjoy a little light reading on all of our top news from the past week here.<\/p>\n<p>We continued our 2016 Cybersecurity Predictions series:<\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1PGx3mX\" rel=\"nofollow,noopener\" >Prediction 1<\/a>: Joerg Sieber predicts how changes in marketing trends could impact web-based attacks in 2016.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1QKVwbn\" rel=\"nofollow,noopener\" >Prediction 2<\/a>: Brian Tokuyoshi predicts that the \u201cwhat\u201d will matter more than the \u201cwho\u201d in mobile security.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1OW2L0P\" rel=\"nofollow,noopener\" >Prediction 3<\/a>: Matt Keil predicts public cloud security will move into the spotlight.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-500x175.png\" alt=\"Top-10-Predictions-Banner\" width=\"500\" height=\"175\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-230x81.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-114x40.png 114w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p>Interested in presenting at Ignite 2016? <a href=\"http:\/\/bit.ly\/1I4UHTR\" rel=\"nofollow,noopener\" >The Call for Papers<\/a> is now open, along with <a href=\"https:\/\/boom.weboom.com\/sites\/paloaltonetworks\/ignite2016\/forms\/regform.html\" rel=\"nofollow,noopener\" >early bird registration<\/a>. Register before December 31 for $400 off your conference pass.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10919 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png\" alt=\"Ignite 2016\" width=\"500\" height=\"124\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-230x57.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-510x126.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-162x40.png 162w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png 603w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Ryan Olson, Unit 42 Intelligence Director, <a href=\"http:\/\/bit.ly\/1NXCpu2\" rel=\"nofollow,noopener\" >detailed our commitment<\/a> to sharing threat intelligence.<\/p>\n<p>Unit 42 published a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/inside-tdrop2-technical-analysis-of-new-dark-seoul-malware\/\" target=\"_blank\">technical analysis of TDrop2<\/a> with ties to Dark Seoul and Operation Troy campaigns in 2013. The team also <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/attack-campaign-on-the-government-of-thailand-delivers-bookworm-trojan\/\">investigated the Bookworm Trojan<\/a> attackers' tactics, techniques and procedures (TTPs).<\/p>\n<p>Members of the Cybersecurity Canon committee published two new book reviews:<\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1YgJtVD\" rel=\"nofollow,noopener\" >The Illusion of Due Diligence: Notes from the CISO Underground<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/1l6ZQWh\" rel=\"nofollow,noopener\" >America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9648 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png\" alt=\"cybersec canon red\" width=\"500\" height=\"218\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-230x100.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-510x223.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-91x40.png 91w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png 786w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>We published <a href=\"http:\/\/bit.ly\/1MGZhJY\" rel=\"nofollow,noopener\" >this month\u2019s Customer Spotlight<\/a>: A more secure cloud with Palo Alto Networks means even better service from Nexon.<\/p>\n<p>Our People of Palo Alto Networks series this week <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/people-of-palo-alto-networks-stephen-whyte\/\" target=\"_blank\">spotlighted Stephen Whyte<\/a> and why he loves being a part of the solution.<\/p>\n<p>Join Fuel User Group today and <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/the-best-technical-education-at-fuels-spark-user-summits\/\">learn what\u2019s in store<\/a>, and <a href=\"http:\/\/bit.ly\/1HYq4EP\" rel=\"nofollow,noopener\" >who will be presenting<\/a>, at upcoming Spark User Summits in Boston, Sydney &amp; Amsterdam.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10889 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-500x62.jpg\" alt=\"phpThumb_generated_thumbnailjpg\" width=\"500\" height=\"62\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-230x28.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-510x63.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-240x30.jpg 240w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg.jpg 728w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a>\u00a0around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/www.brighttalk.com\/webcast\/13565\/179291?utm_campaign=FY16Q2%20NAM%20Threat%20Cryptowall%20Analyzed%20Report%20Nov15&amp;utm_medium=email&amp;utm_source=Eloqua\" rel=\"nofollow,noopener\" >Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 Threat <\/a><\/p>\n<ul>\n<li>When: December 1, 2015 9:00 AM \u2013 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDQ1MQ==\">Palo Alto Networks and VMware NSX Micro-Segmentation Workshop<\/a><\/p>\n<ul>\n<li>When: December 1, 2015 8:30 AM - 4:30 PM EST<\/li>\n<li>Where: Reston, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDI2NQ==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: December 2, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDYxNQ==\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: December 2, 2015 8:30 AM - 12:00 PM EST<\/li>\n<li>Where: New York, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDQ1Mw==\">Palo Alto Networks and VMware NSX Micro-Segmentation Workshop<\/a><\/p>\n<ul>\n<li>When: December 3, 2015 8:30 AM - 4:30 PM EST<\/li>\n<li>Where: Fulton, MD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUzMw==\">Partner Sales Bootcamp<\/a><\/p>\n<ul>\n<li>When: December 3, 2015 2:00 PM - 5:00 PM EST<\/li>\n<li>Where: Indianapolis, IN<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUxOA==\">Prevenga Ciber-amenazas con Palo Alto Networks y Connext<\/a><\/p>\n<ul>\n<li>When: December 3, 2015 9:00 AM - 12:00 PM CST<\/li>\n<li>Where: Guadalajara, JAL<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU1NQ==\">Take the Ultimate Test Drive!<\/a><\/p>\n<ul>\n<li>When: December 3, 2015 1:00 PM - 4:00 PM CST<\/li>\n<li>Where: Maryland Heights, MO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUyNw==\">\u7d44\u7e54\u3092\u5b88\u308b\uff01\u6a19\u7684\u578b\u653b\u6483\u5bfe\u7b56\u30bb\u30df\u30ca\u30fc<\/a><\/p>\n<ul>\n<li>When: December 3, 2015 1:30 PM - 4:30 PM GMT+9:00<\/li>\n<li>Where: \u6e2f\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0MA==\">12\u67084\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a><\/p>\n<ul>\n<li>When: December 4, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUzNw==\">Die Zwei um Zw\u00f6lf: Die Zwei um zw\u00f6lf: Design Best Practices<\/a><\/p>\n<ul>\n<li>When: December 4, 2015 12:00 PM - 1:00 PM MEZ<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUzNw==\">Virtualized Data Center Workshop with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: December 4, 2015 8:30 AM - 12:30 PM EST<\/li>\n<li>Where: Portland, ME<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enjoy a little light reading on all of our top news from the past week here. We continued our 2016 Cybersecurity Predictions series: Prediction 1: Joerg Sieber predicts how changes in marketing &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,1066,203],"tags":[251,1133,1590,1603,1135],"coauthors":[1546],"class_list":["post-11107","post","type-post","status-publish","format-standard","hentry","category-events","category-fuel-user-group","category-news-of-the-week","tag-cybersecurity-canon","tag-ignite-2016","tag-nexon","tag-people-of-palo-alto-networks","tag-spark-user-summit"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11107"}],"version-history":[{"count":10,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11107\/revisions"}],"predecessor-version":[{"id":11459,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11107\/revisions\/11459"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11107"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}