{"id":5857,"date":"2014-06-13T14:00:07","date_gmt":"2014-06-13T21:00:07","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5857"},"modified":"2021-03-22T07:38:44","modified_gmt":"2021-03-22T14:38:44","slug":"palo-alto-networks-news-week-june-13","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/06\/palo-alto-networks-news-week-june-13\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 June 13"},"content":{"rendered":"<p>Interested in all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a>\u00a0from this past week? You\u2019re in luck, it\u2019s right here.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks researchers <a href=\"http:\/\/bit.ly\/1xEAMbc\" target=\"_blank\" rel=\"noopener\">identify<\/a> 21 new critical vulnerabilities in Internet Explorer.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"150\"><span class=\"ar-custom\" style=\"padding-bottom:106%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-5858 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/internet-explorer-100x100.jpg\" alt=\"internet explorer\" width=\"150\" height=\"159\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/internet-explorer-37x40.jpg 37w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/internet-explorer.jpg 218w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Our <a href=\"http:\/\/bit.ly\/1onX8Ys\" target=\"_blank\" rel=\"noopener\">Application Usage and Threat Report<\/a> looks at the inextricable relationship between threats and applications running on enterprise networks. Check out the below infographic on threats tied to common sharing applications like e-mail and IM. Does anything surprise you?<!--more--><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:201%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5859 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/PAN-Social-Media-1-500x1005.jpg\" alt=\"PAN Social Media 1\" width=\"500\" height=\"1005\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/PAN-Social-Media-1-500x1005.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/PAN-Social-Media-1-230x462.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/PAN-Social-Media-1-149x300.jpg 149w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/PAN-Social-Media-1.jpg 1172w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks experts around the world <a href=\"http:\/\/bit.ly\/1q8C2RG\" target=\"_blank\" rel=\"noopener\">share insights<\/a> about security for the Internet of Things.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1kLaEX6\" target=\"_blank\" rel=\"noopener\">Congrats to our May Picture It winner<\/a>! Don't forget to <a href=\"http:\/\/media.paloaltonetworks.com\/events\/pa7050pic\/PA-7050.pdf\" target=\"_blank\" rel=\"noopener\">download a mini PA-7050<\/a> and <a href=\"http:\/\/media.paloaltonetworks.com\/events\/pa7050pic\/\" target=\"_blank\" rel=\"noopener\">submit<\/a> a photo of it in your data center to enter to win June's prize.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5822 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/5.13_NAM-US_MPitogo_HavasWW-WINNER-500x330.jpg\" alt=\"5.13_NAM-US_MPitogo_HavasWW-WINNER\" width=\"500\" height=\"330\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/5.13_NAM-US_MPitogo_HavasWW-WINNER-500x330.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/5.13_NAM-US_MPitogo_HavasWW-WINNER-230x151.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/5.13_NAM-US_MPitogo_HavasWW-WINNER-454x300.jpg 454w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/5.13_NAM-US_MPitogo_HavasWW-WINNER-60x40.jpg 60w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Scott Simkin explained in\u00a0<a href=\"http:\/\/bit.ly\/1tZkq8n\" target=\"_blank\" rel=\"noopener\">this SecurityWeek article<\/a> why SSL decryption has to be part of every admin\u2019s security strategy and we asked you, \u201cHow much do you really know about <a href=\"http:\/\/bit.ly\/1loamoO\" target=\"_blank\" rel=\"noopener\">SSL use on your network<\/a>?\u201d<\/p>\n<p>The World Cup has started and we have a few<a href=\"http:\/\/bit.ly\/1oNVgdC\" target=\"_blank\" rel=\"noopener\"> tips and tricks<\/a> to help security administrators channel World Cup passion into smart security.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"160\"><span class=\"ar-custom\" style=\"padding-bottom:125%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5833 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/160px-WC-2014-Brasil.svg_.png\" alt=\"160px-WC-2014-Brasil.svg\" width=\"160\" height=\"200\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/160px-WC-2014-Brasil.svg_.png 160w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/160px-WC-2014-Brasil.svg_-32x40.png 32w\" sizes=\"auto, (max-width: 160px) 100vw, 160px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>We've continued to add to our NextWave team to help deliver a next-generation partner experience and new levels of success for our channel. <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/06\/expanding-commitment-channel\/\" target=\"_blank\" rel=\"noopener\">Meet our new colleagues<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"483\"><span class=\"ar-custom\" style=\"padding-bottom:50.93%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-4920 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg\" alt=\"NextWave logo-final\" width=\"483\" height=\"246\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg 483w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-230x117.jpeg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-78x40.jpeg 78w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks Director Pamela Warren spoke at the dedication of Singapore\u2019s ST Electronics DigiSAFE Cybersecurity Centre this month. She <a href=\"http:\/\/bit.ly\/1oOXdXb\" target=\"_blank\" rel=\"noopener\">addressed<\/a> how our platform approach can improve the experience of SOC operations.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5847 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3-500x375.jpg\" alt=\"pic 3\" width=\"500\" height=\"375\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3-500x375.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3-230x172.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3-400x300.jpg 400w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3-53x40.jpg 53w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3.jpg 640w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>We shared <a href=\"http:\/\/bit.ly\/1o5AVCL\" target=\"_blank\" rel=\"noopener\">a few highlights<\/a> from last week\u2019s NextWave partner event in Nieuwegein, The Netherlands.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5812 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4820-500x333.jpg\" alt=\"IMG_4820\" width=\"500\" height=\"333\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4820-500x333.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4820-230x153.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4820-450x300.jpg 450w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4820-60x40.jpg 60w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTg4MA==\" target=\"_blank\" rel=\"noopener\">Convention annuelle du CRIP<\/a> [French]<\/p>\n<ul>\n<li>When: June 17, 2014 from 8:30 AM - 5:30 PM CET<\/li>\n<li>Where: Paris, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIyMA==\" target=\"_blank\" rel=\"noopener\">Defending Industrial Control Systems Against Cyberthreats<\/a><\/p>\n<ul>\n<li>When: June 17, 2014 from 11:30 AM - 1:30 PM PST<\/li>\n<li>Where: Vancouver, BC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIwOQ==\" target=\"_blank\" rel=\"noopener\">Defending Industrial Control Systems Against Cyberthreats<\/a><\/p>\n<ul>\n<li>When: June 18, 2014 from 11:30 AM - 1:30 PM MST<\/li>\n<li>Where: Edmonton, AB<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTkxMw==\" target=\"_blank\" rel=\"noopener\">Forum De La S\u00e9curit\u00e9 IT Mazagan<\/a> [French]<\/p>\n<ul>\n<li>When: June 18, 2014 from 9:00 AM - 6:00 PM WET<\/li>\n<li>Where: El Jadida<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE2Mg==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: June 18, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTQ5NQ==\" target=\"_blank\" rel=\"noopener\">Defending Industrial Control Systems Against Cyberthreats<\/a><\/p>\n<ul>\n<li>When: June 19, 2014 from 11:30 AM - 1:30 PM MST<\/li>\n<li>Where: Calgary, AB<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIxNA==\" target=\"_blank\" rel=\"noopener\">Strategies that Work for Advanced Persistent Threat Prevention<\/a><\/p>\n<ul>\n<li>When: June 19, 2014 from 10:30 AM - 11:30 AM GMT+8:00<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA5Ng==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Brisbane<\/a><\/p>\n<ul>\n<li>When: June 19, 2014 from 12:00 PM - 3:30 PM GMT+10:00<\/li>\n<li>Where: Brisbane<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTA3Ng==\" target=\"_blank\" rel=\"noopener\">Western New York Cyber Security Conference hosted by iSecure<\/a><\/p>\n<ul>\n<li>When: June 19, 2014 from 9:00 AM - 4:00 PM EST<\/li>\n<li>Where: Niagara Falls, NY<\/li>\n<\/ul>\n<p><a href=\"http:\/\/secure.livechatinc.com\/licence\/1555071\/open_chat.cgi?groups=0&amp;embedded=1&amp;session_id=S1399223465.275c5e96fe\" target=\"_blank\" rel=\"noopener\">\u041f\u043e\u0437\u043d\u0430\u043a\u043e\u043c\u044c\u0442\u0435\u0441\u044c \u0441 PA-7050 \u0421\u0430\u043c\u044b\u0439 \u0431\u044b\u0441\u0442\u0440\u044b\u0439 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u044d\u043a\u0440\u0430\u043d \u043d\u043e\u0432\u043e\u0433\u043e \u043f\u043e\u043a\u043e\u043b\u0435\u043d\u0438<\/a> [Russian]<\/p>\n<ul>\n<li>When: June 19, 2014 from 10:30 AM - 11:30 AM GMT+4:00<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIyMg==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: June 20, 2014 from 10:30 AM - 2:30 PM CST<\/li>\n<li>Where: Austin, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI0MQ==\" target=\"_blank\" rel=\"noopener\">Preparing for the Next Security Breach w\/ Dale Meyerrose<\/a><\/p>\n<ul>\n<li>When: June 20, 2014 from 11:00 AM - 2:00 PM EST<\/li>\n<li>Where: New York, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIzMA==\" target=\"_blank\" rel=\"noopener\">Building a Zero Trust Approach to Network Security<\/a><\/p>\n<ul>\n<li>When: June 24, 2014 from 11:00 AM - 12:00 PM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIyNA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: June 24, 2014 from 10:30 AM - 2:30 PM CST<\/li>\n<li>Where: Austin, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI0Ng==\" target=\"_blank\" rel=\"noopener\">Webinar: Combat APTs with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 24, 2014 from 9:30 AM - 10:30 AM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA3Nw==\" target=\"_blank\" rel=\"noopener\">FREE Introduction To True Next-Generation Palo Alto Networks Firewalls<\/a><\/p>\n<ul>\n<li>When: June 25, 2014 from 8:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTgxNQ==\" target=\"_blank\" rel=\"noopener\">Next Generation Security Technical Workshop<\/a><\/p>\n<ul>\n<li>When: June 25, 2014 from 10:00 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIyNw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: June 25, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI2NQ==\" target=\"_blank\" rel=\"noopener\">Strategies that Work for Advanced Persistent Threat Prevention<\/a><\/p>\n<ul>\n<li>When: June 25, 2014 from 2:00 PM - 3:00 PM EST<\/li>\n<li>Where: Sadfa, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIzNQ==\" target=\"_blank\" rel=\"noopener\">Combat APTs with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: June 26, 2014 from 10:30 AM - 11:30 AM GMT+8:00<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI2MA==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive - Melville, NY<\/a><\/p>\n<ul>\n<li>When: June 26, 2014 from 8:30 AM - 1:00 PM EST<\/li>\n<li>Where: Melville, NY<\/li>\n<\/ul>\n<p><a href=\"\/\/events.paloaltonetworks.com\/#sthash.oFUCLqis.dpuf\" target=\"_blank\" rel=\"noopener\">Webinar: Exploit-Wolf im Schafspelz - versteckte Cyber\u200b\u200b-Bedrohungen<\/a> [German]<\/p>\n<ul>\n<li>When: June 27, 2014 from 12:00 PM - 1:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Interested in all of the top Palo Alto Networks news\u00a0from this past week? You\u2019re in luck, it\u2019s right here. &nbsp; &nbsp; Palo Alto Networks researchers identify 21 new critical vulnerabilities in Internet &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[485,134,240,464,355,318,508,515,505],"coauthors":[709],"class_list":["post-5857","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-application-usage-and-threat-report","tag-autr","tag-internet-explorer","tag-internet-of-things","tag-nextwave","tag-pa-7050","tag-ssl","tag-vulnerabilities","tag-world-cup"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5857"}],"version-history":[{"count":6,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5857\/revisions"}],"predecessor-version":[{"id":128764,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5857\/revisions\/128764"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5857"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}