{"id":4231,"date":"2013-12-06T14:00:24","date_gmt":"2013-12-06T22:00:24","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4231"},"modified":"2013-12-13T11:43:09","modified_gmt":"2013-12-13T19:43:09","slug":"palo-alto-networks-news-week-december-6-2013","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2013\/12\/palo-alto-networks-news-week-december-6-2013\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 December 6, 2013"},"content":{"rendered":"<p>Here\u2019s a recap of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\">Palo Alto Networks news and happenings<\/a> from this past week. Come back and visit us every Friday to learn all the latest!<!--more--><\/p>\n<p>Watch this <a href=\"http:\/\/bit.ly\/1aqsGE7\" rel=\"nofollow,noopener\"  target=\"_blank\">IT Executive video interview<\/a> with our CMO <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/rene\/\" target=\"_blank\">Rene Bonvanie<\/a> about applications for secure mobile access.<\/p>\n<p><a href=\"http:\/\/bit.ly\/18CJMon\" rel=\"nofollow,noopener\"  target=\"_blank\">Tip of the Week<\/a>: <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/danelle\/\" target=\"_blank\">Danelle Au<\/a> discusses who every CISO should be communicating with on a regular basis.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1baob3H\" rel=\"nofollow,noopener\"  target=\"_blank\">Register<\/a> for Ignite 2014 by tomorrow (12\/7) and save $200! And be sure to follow Ignite 2014 on Twitter (<a href=\"https:\/\/twitter.com\/ignite_conf\" rel=\"nofollow,noopener\" >@Ignite_Conf)<\/a>.<\/p>\n<p>Ignite 2014 <a href=\"http:\/\/bit.ly\/1bl1Q0R\" rel=\"nofollow,noopener\"  target=\"_blank\">Call for Speakers<\/a> closes soon but there's still time for you to influence the direction of the conference and even be a part of it! We\u2019re looking for abstracts that include innovative use cases, practical integration, and in-depth explanations of lessons learned from real-world deployments of next-generation security.<\/p>\n<p>This week we also began giving you an idea of what we expect from the industry next year. Here\u2019s a look at the first three batches of Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/2014-predictions\/\" target=\"_blank\">2014 cybersecurity predictions<\/a>:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/isabelledumont\/\" target=\"_blank\">Isabelle Dumont<\/a> speculates on next year\u2019s industry-focused\u00a0<a href=\"http:\/\/bit.ly\/1c9UzS2\" rel=\"nofollow,noopener\"  target=\"_blank\">cybersecurity trends<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/wade\/\" target=\"_blank\">Wade Williamson<\/a> delves into <a href=\"http:\/\/bit.ly\/1dQjgtw\" rel=\"nofollow,noopener\"  target=\"_blank\">APTs and the overall threat landscape<\/a>, including financially motivated malware and a skills shortage<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/matt\/\" target=\"_blank\">Matt Keil<\/a> discusses the future of <a href=\"http:\/\/bit.ly\/1bjVouJ\" rel=\"nofollow,noopener\"  target=\"_blank\">firewalls<\/a><\/li>\n<\/ul>\n<p>We\u2019ll have more predictions next week, so be sure you come back to learn what else we see coming next year.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4209 lozad\" alt=\"PAN_PredictionsCyberSecurityLogo-01\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-500x295.jpg\" width=\"500\" height=\"295\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-500x295.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-230x135.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-510x300.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-67x40.jpg 67w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a recap of the top Palo Alto Networks news and happenings from this past week. Come back and visit us every Friday to learn all the latest!<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203,229],"tags":[233,94,120,1815,217,29,1821],"coauthors":[],"class_list":["post-4231","post","type-post","status-publish","format-standard","hentry","category-news-of-the-week","category-predictions","tag-2014-predictions","tag-ciso","tag-cybersecurity","tag-firewall","tag-ignite-2014","tag-threat-prevention","tag-tip-of-the-week"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4231"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4231\/revisions"}],"predecessor-version":[{"id":4291,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4231\/revisions\/4291"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4231"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}