{"id":7388,"date":"2014-11-15T16:00:55","date_gmt":"2014-11-16T00:00:55","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7388"},"modified":"2015-12-08T16:44:19","modified_gmt":"2015-12-09T00:44:19","slug":"palo-alto-networks-news-week-november-15","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/11\/palo-alto-networks-news-week-november-15\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 November 15"},"content":{"rendered":"<p>Here is the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\">Palo Alto Networks news<\/a> from this past week.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/bit.ly\/ZVnwBR\" rel=\"nofollow,noopener\" >Check out the love story of the year.<\/a><\/p>\n<p style=\"text-align: center;\"><div style=\"max-width:100%\" data-width=\"485\"><span class=\"ar-custom\" style=\"padding-bottom:55.46%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-7290 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/her.png\" alt=\"her\" width=\"485\" height=\"269\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/her.png 485w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/her-230x127.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/her-72x40.png 72w\" sizes=\"auto, (max-width: 485px) 100vw, 485px\" \/><\/span><\/div><\/p>\n<p>This week we officially kicked off Ignite 2015 with the opening of online registration! Register by January 31 to take advantage of early bird pricing and save $200 off the regular conference pass rate. <a href=\"http:\/\/bit.ly\/14dGir5\" rel=\"nofollow,noopener\"  target=\"_blank\">Read on for all the reasons you need to be there this year<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"400\"><span class=\"ar-custom\" style=\"padding-bottom:27.5%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-7354 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg\" alt=\"PAN_IC15_web_logo-1\" width=\"400\" height=\"110\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg 400w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-230x63.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-145x40.jpg 145w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/span><\/div><!--more--><\/p>\n<p>Rick Howard <a href=\"http:\/\/bit.ly\/1tTLFFg\" rel=\"nofollow,noopener\"  target=\"_blank\">explains<\/a> how to get involved in the Cybersecurity Canon and how to submit your favorite cybersecurity book for consideration.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4993 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/cybersec-canon-red-500x218.png\" alt=\"cybersec canon red\" width=\"500\" height=\"218\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/cybersec-canon-red-500x218.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/cybersec-canon-red-230x100.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/cybersec-canon-red-510x223.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/cybersec-canon-red-91x40.png 91w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/cybersec-canon-red.png 786w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Unit 42 <a href=\"http:\/\/bit.ly\/1zfE04D\" rel=\"nofollow,noopener\"  target=\"_blank\">discussed<\/a> WireLurker attribution, including a translated summary of what a Chinese-language blogger found when he attempted to track down the author, and continuing analysis.<\/p>\n<p>Palo Alto Networks researcher <a href=\"http:\/\/bit.ly\/1sAcNVH\" rel=\"nofollow,noopener\"  target=\"_blank\">discovered three new critical Internet Explorer (IE) vulnerabilities<\/a> impacting IE versions 8, 9, 10 and 11, including two IE Memory Corruption Vulnerability and an IE ASLR Bypass Vulnerability.<\/p>\n<p>The much-anticipated PAN-OS 6.1 is here, bringing with it many new features and functionality. <a href=\"http:\/\/bit.ly\/1pKi7Kw\" rel=\"nofollow,noopener\"  target=\"_blank\">Here are nine new features to read up on<\/a>.<\/p>\n<p>If you\u2019ve been to our Technical Documentation portal recently, you might have noticed a few updates to our Release Notes. <a href=\"http:\/\/bit.ly\/1tZA6uQ\" rel=\"nofollow,noopener\"  target=\"_blank\">The new features are summarized here<\/a>.<\/p>\n<p>Did you catch Palo Alto Networks at <a href=\"http:\/\/bit.ly\/14ocXdo\" rel=\"nofollow,noopener\"  target=\"_blank\">AWS re:Invent<\/a>?<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7381 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/IMG_3773-500x500.jpg\" alt=\"IMG_3773\" width=\"500\" height=\"500\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/IMG_3773-500x500.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/IMG_3773-100x100.jpg 100w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/IMG_3773-230x230.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/IMG_3773-300x300.jpg 300w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/IMG_3773-40x40.jpg 40w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/IMG_3773-32x32.jpg 32w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/IMG_3773-64x64.jpg 64w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/IMG_3773-96x96.jpg 96w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/IMG_3773-128x128.jpg 128w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Del Rodillas shared insights <a href=\"http:\/\/bit.ly\/110CSGa\" rel=\"nofollow,noopener\"  target=\"_blank\">on defending your SCADA network<\/a> from Zero Day threats with the capability of the WildFire appliance, the WF-500, to generate threat prevention signatures on premises.<\/p>\n<p style=\"text-align: left;\">We were pleased to announce that the PA-7050 Series was named as a \u2018<a href=\"http:\/\/bit.ly\/1yCY53G\" rel=\"nofollow,noopener\"  target=\"_blank\">2014 Readers\u2019 Choice Award winner<\/a>\u2019 in the Enterprise Firewall category of Information Security magazine\u2019s 2014 Readers\u2019 Choice Awards.<\/p>\n<p>Palo Alto Networks was again named to <a href=\"http:\/\/bit.ly\/11o2uNU\" rel=\"nofollow,noopener\"  target=\"_blank\">Deloitte's Technology Fast 500<\/a>\u2122, and we\u2019re proud to be one of a few enterprise security companies to make the Top 50 rank.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"262\"><span class=\"ar-custom\" style=\"padding-bottom:82.44%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-7375 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/us_tmtf500.jpg\" alt=\"us_tmtf500\" width=\"262\" height=\"216\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/us_tmtf500.jpg 262w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/us_tmtf500-230x189.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/us_tmtf500-48x40.jpg 48w\" sizes=\"auto, (max-width: 262px) 100vw, 262px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Earlier this week more than 100 participants gathered at the Copenhagen Marriott in Denmark for a meeting on Cyber Crime and discussions of moving security beyond the IT department and into the board room. <a href=\"http:\/\/bit.ly\/1uazuTf\" rel=\"nofollow,noopener\"  target=\"_blank\">We were happy to have been part of the important event<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7364 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/AMCHAM_CyberSecurity_WEB_Nov12_PJUHL2014-79.jpg\" alt=\"AMCHAM_CyberSecurity_WEB_Nov12_PJUHL2014-79\" width=\"500\" height=\"333\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/AMCHAM_CyberSecurity_WEB_Nov12_PJUHL2014-79.jpg 294w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/AMCHAM_CyberSecurity_WEB_Nov12_PJUHL2014-79-230x153.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/AMCHAM_CyberSecurity_WEB_Nov12_PJUHL2014-79-60x40.jpg 60w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>We\u2019re on the road with VMware and VMUG in the U.S. and Canada this month and next to discuss how you can strengthen your data center security without compromising application performance. <a href=\"http:\/\/bit.ly\/1rvJvpy\" rel=\"nofollow,noopener\"  target=\"_blank\">Find an event near you<\/a> to learn best practices for implementing advanced security services in a SDDC, to hear customer insights for deploying VMware NSX with micro-segmentation, and to get hands-on experience test-driving an integrated VMware-Palo Alto Networks solution.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:20.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7150 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nkwkggtw-500x101.jpg\" alt=\"nkwkggtw\" width=\"500\" height=\"101\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nkwkggtw-500x101.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nkwkggtw-230x46.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nkwkggtw-510x103.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nkwkggtw-197x40.jpg 197w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/nkwkggtw.jpg 700w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>We\u2019re also on the road across North and South America with Citrix and CA for the next several weeks to talk about how enterprises can streamline virtualized data centers, radically simply network services for delivering critical applications and reduce complexity and cost, all without sacrificing performance and security. <a href=\"http:\/\/bit.ly\/1t3ZQHK\" rel=\"nofollow,noopener\"  target=\"_blank\">Join us at an event near you<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:16.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7213 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/banner-500x81.jpg\" alt=\"banner\" width=\"500\" height=\"81\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/banner-500x81.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/banner-230x37.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/banner-510x83.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/banner-240x40.jpg 240w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/banner.jpg 915w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjY2Mw==\" target=\"_blank\">Lunch: Scott Stevens discusses Zero Trust model for Security<\/a><\/p>\n<ul>\n<li>When: November 17, 2014 12:30 PM - 2:00 PM (GMT + 10:00)<\/li>\n<li>Where: Brisbane, QLD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjYzMA==\" target=\"_blank\">Datacenter Consolidation Seminar Series - Washington, DC<\/a><\/p>\n<ul>\n<li>When: November 18, 2014 11:00 AM - 2:00 PM EST<\/li>\n<li>Where: Washington, DC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU0Nw==\" target=\"_blank\">Join Unit 42 and Uncover a New Source of Cyberthreats<\/a><\/p>\n<ul>\n<li>When: November 18, 2014 8:30 AM - 10:30 AM EST<\/li>\n<li>Where: Toronto, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU4Ng==\" target=\"_blank\">Take the Ultimate Test Drive!<\/a><\/p>\n<ul>\n<li>When: November 18, 2014 8:30 AM \u2013 12:30 PM EST<\/li>\n<li>Where: Bohemia, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU5Mw==\" target=\"_blank\">Webinar Sant\u00e9<\/a><\/p>\n<ul>\n<li>When: November 18, 2014 10:30 AM \u2013 11:30 AM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU2MQ==\" target=\"_blank\">11\u670819\u65e5(\u6c34)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e(\u5927\u962a)<\/a>\u00a0[Japanese]<\/p>\n<ul>\n<li>When: November 19, 2014 1:30 PM \u2013 5:00 PM GMT<\/li>\n<li>Where: \u5927\u962a\u5e02\u5317\u533a<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjYzMQ==\" target=\"_blank\">Datacenter Consolidation Seminar Series \u2013 Lima, Peru<\/a><\/p>\n<ul>\n<li>When: November 19, 2014 12:00 PM \u2013 3:00 PM EST<\/li>\n<li>Where: Lima, Peru<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU0OA==\" target=\"_blank\">Join Unit 42 and Uncover a New Source of Cyberthreats<\/a><\/p>\n<ul>\n<li>When: November 19, 2014 8:30 AM \u2013 10:30 AM MST<\/li>\n<li>Where: Calgary, AB<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjYwMA==\" target=\"_blank\">Online Demonstration og oplev vores N\u00e6ste Generations Firewall\u2019s<\/a> [Danish]<\/p>\n<ul>\n<li>When: November 19, 2014 1:00 PM \u2013 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjYzOQ==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: November 19, 2014 9:00 AM \u2013 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU4Mw==\" target=\"_blank\">Palo Alto\u2019s Next-Generation Security<\/a><\/p>\n<ul>\n<li>When: November 19, 2014 10:00 AM \u2013 3:00 PM EST<\/li>\n<li>Where: Wayne PA<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjY4Ng==\" target=\"_blank\">Ultimate Test Drive Workshop on NSX<\/a><\/p>\n<ul>\n<li>When: November 19, 2014 9:00 AM \u2013 12:30 PM<\/li>\n<li>Where: Melbourne, VIC<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjUyNw==\" target=\"_blank\">Black Hat Webcast Series \u2013 Amazon Web Services Security Basics<\/a><\/p>\n<ul>\n<li>When: November 20, 2014 11:00 AM \u2013 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU5Mg==\" target=\"_blank\">Er du forberedt til \u00e5 h\u00e5ndtere ukjente trussler i ditt nettverk?<\/a>\u00a0[Norwegian]<\/p>\n<ul>\n<li>When: November 20, 2014 1:00 PM \u2013 1:30 PM MEZ<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU0OQ==\" target=\"_blank\">Join Unit 42 and Uncover a New Source of Cyberthreats<\/a><\/p>\n<ul>\n<li>When: November 20, 2014 8:30 AM \u2013 10:30 AM PST<\/li>\n<li>Where: Vancouver, BC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU2Nw==\">11\u670821\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f<\/a> [Japanese]<\/p>\n<ul>\n<li>When: November 21, 2014 1:30 PM \u2013 5:00 PM GMT<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU1MA==\" target=\"_blank\">FSI Technical roundtable - Invitation only<\/a><\/p>\n<ul>\n<li>When: November 25, 2014 11:30 AM - 1:30 PM EST<\/li>\n<li>Where: Toronto, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU4OQ==\" target=\"_blank\">Next-Generation Firewall Live Demo Webinar<\/a><\/p>\n<ul>\n<li>When: November 25, 2014 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjcwMw==\" target=\"_blank\">Webinar Endpoint Security<\/a> [Dutch]<\/p>\n<ul>\n<li>When: November 25, 2014 11:00 AM - 12:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjY5MQ==\" target=\"_blank\">11\u670826\u65e5(\u6c34)Web\uff7e\uff90\uff85\uff70<\/a><\/p>\n<ul>\n<li>When: November 26, 2014 1:30 PM - 2:30 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here is the top Palo Alto Networks news from this past week. &nbsp; Check out the love story of the year. This week we officially kicked off Ignite 2015 with the opening &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[896,830,118,251,894,396,240,92,869,175,872],"coauthors":[709],"class_list":["post-7388","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-2014-readers-choice-award","tag-ca","tag-citrix","tag-cybersecurity-canon","tag-deloittes-technology-fast-500","tag-ignite-2015","tag-internet-explorer","tag-scada","tag-vmug","tag-vmware","tag-wirelurker"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7388"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7388\/revisions"}],"predecessor-version":[{"id":11305,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7388\/revisions\/11305"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7388"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}