{"id":11213,"date":"2015-12-05T04:00:33","date_gmt":"2015-12-05T12:00:33","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11213"},"modified":"2015-12-08T17:10:59","modified_gmt":"2015-12-09T01:10:59","slug":"palo-alto-networks-news-of-the-week-december-5","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/12\/palo-alto-networks-news-of-the-week-december-5\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 December 5"},"content":{"rendered":"<p>Here\u2019s a brief recap on all the happenings at Palo Alto Networks from the past week.<\/p>\n<p>We added to our 2016 Cybersecurity Predictions series:<!--more--><\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1PGx3mX\" rel=\"nofollow,noopener\" >Prediction 1<\/a>: Joerg Sieber predicts how changes in marketing trends could impact web-based attacks in 2016.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1QKVwbn\" rel=\"nofollow,noopener\" >Prediction 2<\/a>: Brian Tokuyoshi predicts that the \u201cwhat\u201d will matter more than the \u201cwho\u201d in mobile security.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1OW2L0P\" rel=\"nofollow,noopener\" >Prediction 3<\/a>: Matt Keil predicts public cloud security will move into the spotlight.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1N0n2QK\" rel=\"nofollow,noopener\" >Prediction 4<\/a>: Michael Moshiri predicts that growth in exploit-based attacks will require increased emphasis on prevention.<\/li>\n<li><a href=\"http:\/\/bit.ly\/21tluVG\" rel=\"nofollow,noopener\" >Prediction 5<\/a>: Jonathan Lewis predicts the major trends that will gain prominence for service providers next year.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1HGCAJn\" rel=\"nofollow,noopener\" >Prediction 6<\/a>: Del Rodillas predicts the rise of mobility in the Industrial Internet of Things (IIoT), and how attackers will also start to use it to compromise the automation environment.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-500x175.png\" alt=\"Top-10-Predictions-Banner\" width=\"500\" height=\"175\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-230x81.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-114x40.png 114w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Ignite 2016 is only a few months away! Want to attend? <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/register-now-for-ignite-2016\/\">Register<\/a> before December 31 for $400 off your conference pass. Want to take the stage? The <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/want-to-present-at-ignite-2016-call-for-papers-is-now-open\/\">Call for Papers<\/a> is open! Submit today.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10919 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png\" alt=\"Ignite 2016\" width=\"500\" height=\"124\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-230x57.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-510x126.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-162x40.png 162w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png 603w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>In <a href=\"http:\/\/bit.ly\/1Oys1t4\" rel=\"nofollow,noopener\" >Part 3 of the Adversaries and Their Motivations blog series<\/a>, Unit 42 explored the top-level actor motivations: Cyber Warfare, Cyber Terrorism, and Cyber Mischief.<\/p>\n<p style=\"padding-left: 30px;\"><em>Catch up on <\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/10\/adversaries-and-their-motivations-part-1\/\"><em>Part 1<\/em><\/a><em>: The underlying concepts and the value proposition for exploring who is attacking a network and why; and <\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/adversaries-and-their-motivations-part-2\/\"><em>Part 2<\/em><\/a><em>: Cyber Espionage, Cyber Crime, and Cyber Hacktivism<\/em>.<\/p>\n<p>Unit 42 analyzed the <a href=\"http:\/\/bit.ly\/1TI8bLR\" rel=\"nofollow,noopener\" >Rootnik android trojan<\/a> that abuses commercial rooting tool and steals private information.<\/p>\n<p>Del Rodillas <a href=\"http:\/\/bit.ly\/1YLoeLT\" rel=\"nofollow,noopener\" >detailed the Security Lifecycle Report<\/a>, a free assessment Palo Alto Networks offers as a way to provide users a detailed view of what applications and risks may be running in their industrial control systems (ICS) environment.<\/p>\n<p>In <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/exploitation-demystified-why-what-and-how-part-1\/\">Part 1<\/a> of <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/exploitation-demystified\/\">Exploitation Demystified<\/a>, Yiftach Keshet laid the foundation of memory corruption exploitation, and presented the basic exploitation framework. In <a href=\"http:\/\/bit.ly\/1PoZHe2\" rel=\"nofollow,noopener\" >Part 2<\/a>, he covered the implementation of Overwrite and Redirect in the context of stack based buffer overflow vulnerabilities. Stay tuned for Part 3, where Yiftach will go over implementation of the exploitation framework on heap-based vulnerabilities.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/exploit1-500x1011.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:20.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11216 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/exploit1-500x1011-500x101.png\" alt=\"exploit1-500x101\" width=\"500\" height=\"101\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/exploit1-500x1011.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/exploit1-500x1011-230x46.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/exploit1-500x1011-198x40.png 198w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Kate Taylor <a href=\"http:\/\/bit.ly\/1kM2NMp\" rel=\"nofollow,noopener\" >shared a few tips and tricks<\/a> on ways to combine and use features on our platform to help our customers better secure their organizations.<\/p>\n<p>Brian Kelly explained why \"<a href=\"http:\/\/bit.ly\/1NEe91k\" rel=\"nofollow,noopener\" >Metasploit: The Penetration Tester\u2019s Guide<\/a>\" is worthy of inclusion in the Cybersecurity Canon.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9648 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png\" alt=\"cybersec canon red\" width=\"500\" height=\"218\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-230x100.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-510x223.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-91x40.png 91w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png 786w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Looking for our latest channel-specific news? We rounded up all of the recent NextWave Partner news in <a href=\"http:\/\/bit.ly\/1Q3OBet\" rel=\"nofollow,noopener\" >this week's Channel Scoop<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10802 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\" alt=\"PAN_ChannelScoop_Blog\" width=\"498\" height=\"269\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg 498w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-230x124.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>A reminder, it\u2019s your last chance to register for this month's <a href=\"http:\/\/bit.ly\/1OxLUAw\" rel=\"nofollow,noopener\" >Spark User Summits<\/a> in Sydney, Amsterdam, and Boston.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/spark_user_summit-500x309.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:61.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10821 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/spark_user_summit-500x309-500x309.png\" alt=\"spark_user_summit-500x309\" width=\"500\" height=\"309\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/spark_user_summit-500x309.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/spark_user_summit-500x309-230x142.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/spark_user_summit-500x309-485x300.png 485w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/spark_user_summit-500x309-65x40.png 65w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11218 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-500x62.jpg\" alt=\"phpThumb_generated_thumbnailjpg-500x62\" width=\"500\" height=\"62\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-230x29.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-240x30.jpg 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a>\u00a0around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUyMw==\">Palo Alto Networks and Tanium VIP Reception<\/a><\/p>\n<ul>\n<li>December 8, 2015 5:00 PM - 9:30 PM EST<\/li>\n<li>Indianapolis, IN<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUzMQ==\">TechSummit Japan 2015 Winter<\/a> [Japanese]<\/p>\n<ul>\n<li>December 8, 2015 1:30 PM - 5:30 PM GMT+9:00<\/li>\n<li>\u4e2d\u592e\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDYwOQ==\">Palo Alto Networks Seminar<\/a><\/p>\n<ul>\n<li>December 9, 2015 9:00 AM - 12:00 PM GMT+4:00<\/li>\n<li>Abu Dhabi<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDI2Ng==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>December 9, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDYxOA==\">Introduction to Palo Alto Networks Next Generation Firewalls<\/a><\/p>\n<ul>\n<li>December 10, 2015 10:00 AM - 6:00 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDYxMg==\">Palo Alto Networks Seminar<\/a><\/p>\n<ul>\n<li>December 10, 2015 9:00 AM - 12:00 PM GMT+4:00<\/li>\n<li>Dubai<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDYzOA==\">Secure the Force: Star Wars y los ciber-ataques m\u00e1s usados en el 2015<\/a> [Spanish]<\/p>\n<ul>\n<li>December 10, 2015 7:00 PM - 11:30 PM CST<\/li>\n<li>Ciudad de M\u00e9xico<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDYyNg==\">Seguridad en el data center con Palo Alto Networks &amp; VMware<\/a> [Spanish]<\/p>\n<ul>\n<li>December 10, 2015 8:00 AM - 12:00 PM CST<\/li>\n<li>Ciudad de M\u00e9xico<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0Ng==\">12\u670811\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e(\u5927\u962a)<\/a> [Japanese]<\/p>\n<ul>\n<li>December 11, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>\u5927\u962a\u5e02\u5317\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/webinar.darkreading.com\/1446?keycode=CAA1AC\" rel=\"nofollow,noopener\" >Why Layered Security Strategies Don\u2019t Work \u2013 And What You Can Do About It<\/a><\/p>\n<ul>\n<li>December 15, 2015 10:00 AM \u2013 11:00 AM PT<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/offers.tanium.com\/Webinar-Palo-Alto-Networks-Tanium-Malicious-Behavior-Detection-at-Scale.html\" rel=\"nofollow,noopener\" >Palo Alto Networks &amp; Tanium: Webinar Malicious Behavior Detection at Scale<\/a><\/p>\n<ul>\n<li>December 16, 2015 10:00 AM \u2013 11:00 AM PT<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0OA==\">12\u670816\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>December 16, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>\u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU2OQ==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>December 16, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU1NQ==\">Take the Ultimate Test Drive!<\/a><\/p>\n<ul>\n<li>December 16, 2015 1:00 PM - 4:00 PM CST<\/li>\n<li>Maryland Heights , MO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY4Ng==\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>December 16, 2015 9:30 AM - 1:00 PM GMT<\/li>\n<li>London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0MQ==\">12\u670818\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0<\/a><\/p>\n<ul>\n<li>December 18, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>\u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a brief recap on all the happenings at Palo Alto Networks from the past week. We added to our 2016 Cybersecurity Predictions series:<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,1066,203],"tags":[250,1819,1624,1135],"coauthors":[1546],"class_list":["post-11213","post","type-post","status-publish","format-standard","hentry","category-events","category-fuel-user-group","category-news-of-the-week","tag-cybersecurity-cannon","tag-ignite","tag-rootnik","tag-spark-user-summit"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11213"}],"version-history":[{"count":7,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11213\/revisions"}],"predecessor-version":[{"id":11334,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11213\/revisions\/11334"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11213"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}