{"id":12088,"date":"2016-02-06T04:00:50","date_gmt":"2016-02-06T12:00:50","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=12088"},"modified":"2016-02-05T15:34:49","modified_gmt":"2016-02-05T23:34:49","slug":"palo-alto-networks-news-of-the-week-february-6","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2016\/02\/palo-alto-networks-news-of-the-week-february-6\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 February 6"},"content":{"rendered":"<p>Here\u2019s all of the top Palo Alto Networks news from this past week.<\/p>\n<p>In a new study released this week, <a href=\"http:\/\/bit.ly\/1SlBqa6\" rel=\"nofollow,noopener\" >Palo Alto Networks partnered with the Ponemon Institute<\/a> to understand not only what motivates cyberattackers but also how we can turn the tables on them by taking away their financial incentives to attack.<!--more--><\/p>\n<p><a href=\"http:\/\/media.paloaltonetworks.com\/lp\/ponemon\/report.html?CampaignId=70170000001LV9xAAG&amp;referer=null&amp;utm_medium=social-owned-promo&amp;utm_source=Infographic\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:113%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-12089 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/PAN_Ponemon_infographic-03-500x565.jpg\" alt=\"PAN_Ponemon_infographic-03\" width=\"500\" height=\"565\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/PAN_Ponemon_infographic-03-500x565.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/PAN_Ponemon_infographic-03-230x260.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/PAN_Ponemon_infographic-03-265x300.jpg 265w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/PAN_Ponemon_infographic-03-35x40.jpg 35w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Did Operation Lotus Blossom cause Emissary Trojan Changelog to evolve? Unit 42 <a href=\"http:\/\/bit.ly\/1JYxR6O\" rel=\"nofollow,noopener\" >investigated Emissary Trojan Changelog and addressed this question.<\/a><\/p>\n<p>The team also <a href=\"http:\/\/bit.ly\/1TGObes\" rel=\"nofollow,noopener\" >found T9000<\/a>, an advanced modular backdoor that uses complex anti-analysis techniques.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10819 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-500x68.png\" alt=\"blog-title-unit42-500x68\" width=\"500\" height=\"68\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-230x31.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Greg Day, VP &amp; CSO, EMEA, <a href=\"http:\/\/bit.ly\/1TAEbTZ\" rel=\"nofollow,noopener\" >discussed<\/a> the growing role of cyber insurance.<\/p>\n<p>Robert Clark <a href=\"http:\/\/bit.ly\/20nu6z6\" rel=\"nofollow,noopener\" >reviewed<\/a> \"Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell\" for the Cybersecurity Canon.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11567 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-500x218.png\" alt=\"cybersec-canon-red-500x218\" width=\"500\" height=\"218\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-230x100.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-92x40.png 92w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>The <a href=\"http:\/\/bit.ly\/1STTcRn\" rel=\"nofollow,noopener\" >Technical Documentations team released<\/a> new Traps 3.3.1 documentation.<\/p>\n<p>Del Rodillas and Bryan Lee <a href=\"http:\/\/bit.ly\/1QIQnj1\" rel=\"nofollow,noopener\" >discussed why power grid security<\/a> is top of mind in 2016.<\/p>\n<p>Ignite is coming up soon. <a href=\"http:\/\/bit.ly\/1SrhX81\" rel=\"nofollow,noopener\" >Find out what\u2019s new<\/a> at this year\u2019s conference, and watch this video to find out why you don\u2019t want miss it:<\/p>\n<p><div class=\"styleIt\" style=\"width:500px;height:281px;\"><lite-youtube videoid=\"dOQ5-a6z_MM\" ><\/lite-youtube><\/div><\/p>\n<p><a href=\"https:\/\/boom.weboom.com\/sites\/paloaltonetworks\/ignite2016\/forms\/regform.html\" rel=\"nofollow,noopener\" >Register<\/a> &amp; <a href=\"http:\/\/on.fb.me\/23tWdeV\" rel=\"nofollow,noopener\" >RSVP<\/a> today.<\/p>\n<p>Read <a href=\"http:\/\/bit.ly\/1SxEwI9\" rel=\"nofollow,noopener\" >this week's NextWave Partner<\/a> Channel Scoop.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10802 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\" alt=\"PAN_ChannelScoop_Blog\" width=\"498\" height=\"269\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg 498w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-230x124.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11218 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-500x62.jpg\" alt=\"youre invited\" width=\"500\" height=\"62\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-230x29.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-240x30.jpg 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a>\u00a0around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDkyNw==\">Virtual Ultimate Test Drive: Next Generation Firewall<\/a><\/p>\n<ul>\n<li>February 8, 2016 1:00 PM - 4:00 PM CET<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk2MA==\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>February 9, 2016 10:00 AM - 3:30 PM WET<\/li>\n<li>London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDczMg==\">Meet the CMO &amp; Corporate Officer of Palo Alto Networks, Ren\u00e9 Bonvanie<\/a><\/p>\n<ul>\n<li>February 10, 2016 7:30 AM - 9:30 AM GMT+11:00<\/li>\n<li>Sydney, NSW<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDczMw==\">Meet the CMO &amp; Corporate Officer of Palo Alto Networks, Ren\u00e9 Bonvanie<\/a><\/p>\n<ul>\n<li>February 10, 2016 12:00 PM - 2:30 PM GMT+10:00<\/li>\n<li>Brisbane, QLD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDkzNQ==\">Palo Alto Networks Data Center Security Webinar - Middle East<\/a><\/p>\n<ul>\n<li>February 10, 2016 10:00 AM - 11:00 AM GMT+3:00<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDcxNA==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>February 10, 2016 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDczNA==\">Meet the CMO &amp; Corporate Officer of Palo Alto Networks, Ren\u00e9 Bonvanie<\/a><\/p>\n<ul>\n<li>February 11, 2016 5:00 PM - 6:30 PM GMT+11:00<\/li>\n<li>Melbourne, VIC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDg5Nw==\">Palo Alto Networks - VMware Ortak Web Semineri<\/a><\/p>\n<ul>\n<li>February 11, 2016 10:00 AM - 11:00 AM EET<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk0NQ==\">Virtual Ultimate Test Drive NGFW, Feb 11, 2016<\/a><\/p>\n<ul>\n<li>February 11, 2016 11:00 AM - 2:00 PM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDY3NA==\">2\u670812\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a><\/p>\n<ul>\n<li>February 12, 2016 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>\u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk2MQ==\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>February 12, 2016 10:00 AM - 3:30 PM WET<\/li>\n<li>London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk0Ng==\">Virtual Ultimate Test Drive Threat Prevention, Feb 12, 2016<\/a><\/p>\n<ul>\n<li>February 12, 2016 11:00 AM - 2:00 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDkyOA==\">Virtual Ultimate Test Drive: Next Generation Firewall<\/a><\/p>\n<ul>\n<li>February 15, 2016 1:00 PM - 4:00 PM CET<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDY2OA==\">Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>February 16, 2016 9:30 AM - 1:00 PM GMT<\/li>\n<li>London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk0Nw==\">Virtual Ultimate Test Drive Threat Prevention, Feb 16, 2016<\/a><\/p>\n<ul>\n<li>February 16, 2016 11:00 AM - 2:00 PM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk3NA==\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>February 17, 2016 11:00 AM - 12:00 PM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDcxNQ==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>February 17, 2016 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk0OA==\">Virtual Ultimate Test Drive VDC Feb 17, 2016<\/a><\/p>\n<ul>\n<li>February 17, 2016 11:00 AM - 2:00 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.brighttalk.com\/webcast\/10903\/190813\" rel=\"nofollow,noopener\" >Scarlet Mimic: Unit 42 Reveals Cyber Espionage Campaign<\/a><\/p>\n<ul>\n<li>February 17, 2016 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDc0Mw==\">2\u670818\u65e5(\u6728)NextWave Summit<\/a><\/p>\n<ul>\n<li>February 18, 2016 4:00 PM - 7:30 PM GMT+9:00<\/li>\n<li>\u4e2d\u592e\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk0OQ==\">Virtual Ultimate Test Drive NGFW Feb 18, 2016<\/a><\/p>\n<ul>\n<li>February 18, 2016 11:00 AM - 2:00 PM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk1MA==\">Virtual Ultimate Test Drive Threat Prevention Feb 19, 2016<\/a><\/p>\n<ul>\n<li>February 19, 2016 11:00 AM - 2:00 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.brighttalk.com\/webcast\/10903\/189523\" rel=\"nofollow,noopener\" >Tackle Your Toughest Security Challenges at Ignite 2016<\/a><\/p>\n<ul>\n<li>February 24, 2016 11:00 AM - 11:30 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.fedinsider.com\/the-cyber-attack-lifecycle-in-government\/\" rel=\"nofollow,noopener\" >The Cyber Attack Lifecycle in Government<\/a><\/p>\n<ul>\n<li>February 24, 2016 2:00 PM - 2:30 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.brighttalk.com\/webcast\/10903\/189463\" rel=\"nofollow,noopener\" >Cybersecurity for Financial Services Industry<\/a><\/p>\n<ul>\n<li>February 25, 2016 10:00 AM - 11:15 AM GMT<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><em><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2016\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-12021 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-500x167.png\" alt=\"Ignite 2016 register now\" width=\"500\" height=\"167\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-500x167.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-230x77.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-510x170.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-120x40.png 120w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now.png 900w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s all of the top Palo Alto Networks news from this past week. In a new study released this week, Palo Alto Networks partnered with the Ponemon Institute to understand not only &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1737,1656,1752,1493,1744,778,424],"coauthors":[1546],"class_list":["post-12088","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-cyber-insurance","tag-emissary","tag-operation-lotus-blossom","tag-ponemon-institute","tag-t9000","tag-traps","tag-trojan"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=12088"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12088\/revisions"}],"predecessor-version":[{"id":12092,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12088\/revisions\/12092"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=12088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=12088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=12088"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=12088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}