{"id":22933,"date":"2016-12-31T04:00:59","date_gmt":"2016-12-31T12:00:59","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=22933"},"modified":"2016-12-30T09:07:38","modified_gmt":"2016-12-30T17:07:38","slug":"palo-alto-networks-news-week-december-31-2016","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2016\/12\/palo-alto-networks-news-week-december-31-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 December 31, 2016"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here.<\/p>\n<ul>\n<li>Our Cybersecurity Predictions series continued with sure things and long shots for cybersecurity in 2017. This week\u2019s predictions include:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/2017-cybersecurity-predictions-automation-playbook-models-take-key-roles-threat-intelligence-sharing\/\">Automation and Playbook Models Take On Key Roles in Threat Intelligence Sharing<\/a><\/li>\n<\/ul>\n<\/li>\n<li>The Technical Documentation team introduced the new <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/tech-docs-introducing-new-palo-alto-networks-compatibility-matrix\/\">Palo Alto Networks Compatibility Matrix<\/a><\/li>\n<li>The Technical Documentation team also shared a post covering the<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/techdocs-protect-saas-latest-aperture-features\/\"> latest Aperture features and how you can use them to protect your SaaS applications<\/a>.<\/li>\n<li>Unit 42 dug into the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/unit42-campaign-evolution-pseudo-darkleech-2016\/\">evolution of the pseudo-Darkleech campaign<\/a> in 2016.<\/li>\n<\/ul>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our new <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/211663\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>January 4, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/207938\">Live Demo: Preventing Breaches on the Endpoint<\/a><\/p>\n<ul>\n<li>January 4, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/201186\">Ultimate Test Drive \u2013 Threat Prevention<\/a><\/p>\n<ul>\n<li>January 5, 2017<\/li>\n<li>Issy les Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/userid011817\">How to Implement User-based Controls for Cybersecurity<\/a><\/p>\n<ul>\n<li>January 18, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry, we\u2019ve rounded up the top news right here. Our Cybersecurity Predictions series continued with sure things and long shots &hellip;<\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[1650,1824],"coauthors":[1515],"class_list":["post-22933","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-cyberthreat-intelligence-sharing","tag-technical-documentation"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=22933"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22933\/revisions"}],"predecessor-version":[{"id":22988,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22933\/revisions\/22988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=22933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=22933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=22933"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=22933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}