{"id":4427,"date":"2014-01-10T05:00:41","date_gmt":"2014-01-10T13:00:41","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4427"},"modified":"2014-01-09T18:14:13","modified_gmt":"2014-01-10T02:14:13","slug":"palo-alto-networks-news-week-january-10-2014","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/01\/palo-alto-networks-news-week-january-10-2014\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 January 10, 2014"},"content":{"rendered":"<p>Another week, another roundup of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\">Palo Alto Networks news<\/a>! Don\u2019t forget to visit us right here, every Friday, for a fresh batch.<!--more--><\/p>\n<p>Palo Alto Networks <a href=\"http:\/\/bit.ly\/1bLsDmX\" rel=\"nofollow,noopener\"  target=\"_blank\">announced<\/a> that we\u2019ve acquired Morta Security.<\/p>\n<p>Isabelle Dumont <a href=\"http:\/\/bit.ly\/1ddY67K\" rel=\"nofollow,noopener\"  target=\"_blank\">discussed<\/a> better POS security with network segmentation and a zero trust approach, as well as how Palo Alto Networks technology addresses CERT\u2019s security recommendations<\/p>\n<p>Tip of the Week: Migrating from Cisco ASA to Palo Alto Networks? <a href=\"http:\/\/bit.ly\/1aFvJcL\" rel=\"nofollow,noopener\"  target=\"_blank\">We can help you learn how to do it<\/a>.<\/p>\n<p>Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/predictions\/\" target=\"_blank\">2014 predictions<\/a> are still being picked up around the globe:<\/p>\n<p>Netherlands<\/p>\n<li><a href=\"http:\/\/www.blogit.nl\/cybersecurity-trends-2014\" rel=\"nofollow,noopener\"  target=\"_blank\">BlogIT<\/a><\/li>\n<\/ul>\n<p>United Kingdom<\/p>\n<li><a href=\"http:\/\/www.itrportal.com\/articles\/2014\/01\/08\/cybersecurity-what-to-consider-in-2014\/\" rel=\"nofollow,noopener\"  target=\"_blank\">IT Reseller Magazine<\/a><\/li>\n<li><a href=\"http:\/\/www.channelpro.co.uk\/opinion\/8181\/cybersecurity-landscape-2014\" rel=\"nofollow,noopener\"  target=\"_blank\">Channel Pro<\/a><\/li>\n<\/ul>\n<p>Spain<\/p>\n<li><a href=\"http:\/\/diarioti.com\/predicciones-para-2014-tres-tendencias-en-ciberseguridad\/72706\" rel=\"nofollow,noopener\"  target=\"_blank\">DiarioTi<\/a><\/li>\n<li><a href=\"http:\/\/www.siliconnews.es\/2014\/01\/07\/la-ciberseguridad-escala-puestos-en-la-lista-de-prioridades-de-las-empresas\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Silicon News<\/a><\/li>\n<li><a href=\"http:\/\/www.csospain.es\/Predicciones-para-2014-Tendencias-en-ciberseguridad\/seccion-estrategias\/articulo-207931\" rel=\"nofollow,noopener\"  target=\"_blank\">CIO Spain<\/a><\/li>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/rick\/\" target=\"_blank\">Rick Howard<\/a> added two more <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\">\u201cmust-read\u201d books<\/a> to his <a href=\"http:\/\/bit.ly\/1cxA6GQ\" rel=\"nofollow,noopener\"  target=\"_blank\">Cybersecurity Canon<\/a>.<\/p>\n<li><a href=\"http:\/\/bit.ly\/1dr6jQQ\" rel=\"nofollow,noopener\"  target=\"_blank\">Confront and Conceal<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/19RaDNY\" rel=\"nofollow,noopener\"  target=\"_blank\">Zero Day<\/a><\/li>\n<\/ul>\n<p>Check out the <a href=\"http:\/\/bit.ly\/JKRu45\" rel=\"nofollow,noopener\"  target=\"_blank\">first entry<\/a> in our \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/spotlight\/\" target=\"_blank\">Spotlight On #Ignite2014<\/a>\u201d blog post series and get a closer look at the marquee track, Building a Next-Generation Cybersecurity Strategy.<\/p>\n<p>There\u2019s still time to save $100 on your <a href=\"http:\/\/bit.ly\/1dpsvMg\" rel=\"nofollow,noopener\"  target=\"_blank\">Ignite 2014<\/a> registration, all you have to do is <a href=\"http:\/\/bit.ly\/1baob3H\" rel=\"nofollow,noopener\"  target=\"_blank\">register<\/a> before January 31!<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:31.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4428 lozad\" alt=\"ignite logo white\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/ignite-logo-white-500x159.png\" width=\"500\" height=\"159\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/ignite-logo-white-500x159.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/ignite-logo-white-230x73.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/ignite-logo-white-510x163.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/ignite-logo-white-125x40.png 125w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/ignite-logo-white.png 738w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another week, another roundup of the top Palo Alto Networks news! Don\u2019t forget to visit us right here, every Friday, for a fresh batch.<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[233,277,251,217,270,279,1821],"coauthors":[],"class_list":["post-4427","post","type-post","status-publish","format-standard","hentry","category-news-of-the-week","tag-2014-predictions","tag-cert","tag-cybersecurity-canon","tag-ignite-2014","tag-morta","tag-spotlight","tag-tip-of-the-week"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4427"}],"version-history":[{"count":7,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4427\/revisions"}],"predecessor-version":[{"id":4435,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4427\/revisions\/4435"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4427"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}