{"id":25248,"date":"2017-03-11T04:00:34","date_gmt":"2017-03-11T12:00:34","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=25248"},"modified":"2018-02-08T20:56:38","modified_gmt":"2018-02-09T04:56:38","slug":"palo-alto-networks-news-week-march-11-2017","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2017\/03\/palo-alto-networks-news-week-march-11-2017\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 March 11, 2017"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry -- we\u2019ve rounded up our top news and views right here:<\/p>\n<ul>\n<li>The Unit 42 Threat Intelligence team shared new research:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/unit42-targeted-ransomware-attacks-middle-eastern-government-organizations-political-purposes\/\">Targeted Ransomware Attacks Middle Eastern Government Organizations for Political Purposes<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks\/\">Pulling Back the Curtains on EncodedCommand PowerShell Attacks<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>We shared how PAN-OS 8.0 and its new hardware <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/pan-os-8-0-new-hardware-enables-powerful-security-performance-without-compromise\/\">enables powerful security performance without compromise<\/a>.<\/li>\n<li>Set. Match. Eila Shargh discussed how <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/game-set-match-traps-protects-stegbaus\/\">Traps can keep your organization safe from Malware<\/a> such as StegBaus.<\/li>\n<li>We announced that <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/virustotal-adds-palo-alto-networks-intelligence-feeds\/\">VirusTotal added Palo Alto Networks known signature scanner<\/a> to their intelligence feeds.<\/li>\n<li>At CDANS 2017, security professionals had the opportunity to <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/gov-cdans-2017-keeping-cybersecurity-skills-sharp-cyber-range\/\">sharpen their cybersecurity skills with Cyber Range<\/a>.<\/li>\n<li>With more medical data migrating to the cloud, Matt Mellen predicts that 2017 will be the year that <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/year-prioritize-cloud-security-healthcare\/\">healthcare organizations prioritize cloud security<\/a>.<\/li>\n<li>This week we announced CYBERFORCE: <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/partner-cyberforce-new-exclusive-palo-alto-networks-partner-recognition-program\/\">a new exclusive Palo Alto Networks partner recognition program<\/a>.<\/li>\n<li>Danielle Kriz gave tips on how your organization can avoid <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/gov-avoid-becoming-next-data-breach-headline\/\">becoming the next data breach headline<\/a>.<\/li>\n<li>Ben Rothke reviewed \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/cybersecurity-canon-advanced-persistent-security-cyberwarfare-approach-implementing-adaptive-enterprise-protection-detection-reaction-strategies\/\">Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies<\/a>\u201d for the Cybersecurity Canon.<\/li>\n<li>Did you know that our very own Rick Howard is a recurring guest on The CyberWire daily podcast? Listen to Rick as he discusses <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/cso-perspectives-on-the-cyberwire\/\">cyber adversary playbooks, automatic orchestration<\/a> and more!<\/li>\n<\/ul>\n<p>Take a look at <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/233946\">Live Webinar: Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>March 14, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/224659\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>March 15, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/233960\">Live Demo: Preventing Security Breaches on the Endpoint<\/a><\/p>\n<ul>\n<li>March 15, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/234138\">PAN-OS 8.0 Update<\/a><\/p>\n<ul>\n<li>March 15, 2017<\/li>\n<li>Denver, CO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/233722\">PAN-OS 8.0 Update<\/a><\/p>\n<ul>\n<li>March 15, 2017<\/li>\n<li>San Diego, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/188313\">Advanced Endpoint Protection, Live Demo<\/a><\/p>\n<ul>\n<li>March 16, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/236284\">Palo Alto Networks New Products &amp; Technologies Webinar<\/a><\/p>\n<ul>\n<li>March 16, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/236146\">Ultimate Test Drive \u2013 Traps<\/a><\/p>\n<ul>\n<li>March 17, 2017<\/li>\n<li>Sydney, Australia<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Sit back, relax and enjoy the top Palo Alto Networks news of the week. <\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[536,3354,251,2889,3188,1391,221,3203,3339,778,586,1042],"coauthors":[1515],"class_list":["post-25248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-cyber-range","tag-cyberforce","tag-cybersecurity-canon","tag-middle-east","tag-pan-os-8-0","tag-powershell","tag-ransomware","tag-stegbaus","tag-the-cyberwire","tag-traps","tag-unit-42","tag-virustotal"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=25248"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25248\/revisions"}],"predecessor-version":[{"id":25257,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25248\/revisions\/25257"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=25248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=25248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=25248"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=25248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}