{"id":5994,"date":"2014-07-02T05:00:23","date_gmt":"2014-07-02T12:00:23","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5994"},"modified":"2014-07-01T09:36:02","modified_gmt":"2014-07-01T16:36:02","slug":"learn-whats-really-happening-network","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/07\/learn-whats-really-happening-network\/","title":{"rendered":"Learn What's Really Happening On Your Network"},"content":{"rendered":"<p>Today's cyber threats hide in plain sight amidst your network traffic, using applications as infiltration vectors, exhibiting application-like evasion tactics and leveraging commonly used network applications for exfiltration.<\/p>\n<p>Over the past few weeks, we've discussed many of the findings from the 2014 Application Usage and Threat Report, highlighting the intertwined relationship between cyber attacks and the applications in use on enterprise networks.<\/p>\n<p>We invite you to join us for a discussion of these findings and application usage and threat trends during a one-hour, online event next week.<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI5OA\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-5995 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg-500x61.jpg\" alt=\"phpThumb_generated_thumbnailjpg\" width=\"500\" height=\"61\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg-500x61.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg-230x28.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg-510x63.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg-240x29.jpg 240w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg.jpg 728w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI5OA\" target=\"_blank\"><b>Hiding in Plain Sight: What's Really Happening On Your Network<\/b><\/a> kicks off at 12:00 pm CET on Wednesday, July 9. <a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI5OA\" target=\"_blank\">Register<\/a> now and learn:<!--more--><\/p>\n<ul>\n<li>How to defend your network from advanced threats<\/li>\n<li>Which applications are the most common threat vectors<\/li>\n<li>Which applications are the most vulnerable or used to mask malware activity<\/li>\n<li>Why SSL decryption has to be part of your enterprise security strategy<\/li>\n<\/ul>\n<h3>For more<\/h3>\n<ul>\n<li><a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\">Download the 2014 Application Usage and Threat Report<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/06\/udp-malware-hiding-place-of-choice\/\" target=\"_blank\">Read why UDP is the malware hiding place of choice<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=OP7oNaVB92s&amp;list=UU2UPStk47kvhBn8P7Q5BaAg\" rel=\"nofollow,noopener\"  target=\"_blank\">Watch a video discussing key findings from the AUTR<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/app-usage-risk-report-visualization-2014\/\" target=\"_blank\">Interactively browse the data using our AUTR visualization tool<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Today's cyber threats hide in plain sight amidst your network traffic, using applications as infiltration vectors, exhibiting application-like evasion tactics and leveraging commonly used network applications for exfiltration. Over the past few &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,133,131,108],"tags":[134,508,538,97],"coauthors":[],"class_list":["post-5994","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-events","category-malware-2","category-threat-prevention-2","tag-autr","tag-ssl","tag-udp","tag-webinar"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5994"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5994\/revisions"}],"predecessor-version":[{"id":5996,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5994\/revisions\/5996"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5994"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}