{"id":8166,"date":"2015-02-14T06:00:58","date_gmt":"2015-02-14T14:00:58","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8166"},"modified":"2021-03-21T09:19:12","modified_gmt":"2021-03-21T16:19:12","slug":"palo-alto-networks-news-week-february-14-2","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/02\/palo-alto-networks-news-week-february-14-2\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 February 14"},"content":{"rendered":"<p>Check out all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\">Palo Alto Networks news<\/a> from this past week.<\/p>\n<p>&nbsp;<\/p>\n<p>In honor of Valentine\u2019s Day, we invite you to once again view the love story of this \u2013 and any other \u2013 year.<\/p>\n<p><div class=\"styleIt\" style=\"width:500px;height:281px;\"><lite-youtube videoid=\"A7Mo973vcWM\" ><\/lite-youtube><\/div><\/p>\n<p>We\u2019re excited to announce the addition of four new members to the Cyber Threat Alliance. <a href=\"http:\/\/bit.ly\/1AtKVu2\" target=\"_blank\" rel=\"noopener\">Find out who is joining<\/a> the coordinated effort to battle cyber adversaries.<!--more--><\/p>\n<p>The Obama administration <a href=\"http:\/\/bit.ly\/1AxdPcD\" target=\"_blank\" rel=\"noopener\">outlined steps<\/a> tech companies will be taking to alert feds to cyber threats, naming the Cyber Threat Alliance as a leading example.<\/p>\n<p>Palo Alto Networks researchers recently explored ways to predict malicious domains so they can be added to blacklists before they go live. Watch <a href=\"http:\/\/bit.ly\/1yQUvCPhttp:\/\/bit.ly\/1yQUvCP\" target=\"_blank\" rel=\"noopener\">this video<\/a> from their presentation at VB2014.<\/p>\n<p>Help shape the future of cybersecurity, and <a href=\"http:\/\/bit.ly\/1ACzqS7\" target=\"_blank\" rel=\"noopener\">join the Fuel User Group today<\/a>! The Palo Alto Networks Fuel User Group (Fuel) is an active community of professionals who, like you, are responsible for securing information and critical infrastructure. The Fuel community is a hub for technical resources and your new source for solving your most difficult cybersecurity challenges.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"400\"><span class=\"ar-custom\" style=\"padding-bottom:49%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-8121 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/Az-zMYLI_400x4001.jpeg\" alt=\"Az-zMYLI_400x400\" width=\"400\" height=\"196\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/Az-zMYLI_400x4001.jpeg 400w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/Az-zMYLI_400x4001-230x112.jpeg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/Az-zMYLI_400x4001-81x40.jpeg 81w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/span><\/div><\/p>\n<p>Check out the <a href=\"http:\/\/bit.ly\/1zHCTwQ\" target=\"_blank\" rel=\"noopener\">top eight reasons<\/a> to attend Ignite 2015. Have we convinced you to attend yet?<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/2015\/index.html\" target=\"_blank\" rel=\"noopener\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:30.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7933 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_-500x151.jpg\" alt=\"ignite 2015_\" width=\"500\" height=\"151\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_-500x151.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_-230x69.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_-510x154.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_-132x40.jpg 132w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_.jpg 660w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Palo Alto Networks CEO, Mark McLaughlin yesterday participated in the <a href=\"http:\/\/bit.ly\/1z8eJbd\" target=\"_blank\" rel=\"noopener\">White House Summit<\/a> on Cybersecurity and Consumer Protection. The event brought together government and industry leaders to help shape public and private sector efforts to protect against future cyber threats.<\/p>\n<p>Palo Alto Networks researcher Bo Qu was credited with identifying 3 critical Internet Explorer vulnerabilities; <a href=\"http:\/\/bit.ly\/1AhwBoq\" target=\"_blank\" rel=\"noopener\">find out more<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7596 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png\" alt=\"blog-title-unit42\" width=\"500\" height=\"68\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-230x31.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-510x69.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-240x32.png 240w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png 632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk3Ng==\" target=\"_blank\" rel=\"noopener\">Advanced Endpoint Protection - We're Changing the Game!<\/a><\/p>\n<ul>\n<li>When: February 17, 2015 10:00 AM - 11:00 AM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc3MQ==\" target=\"_blank\" rel=\"noopener\">2\u670818\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: February 18, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzMw==\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>When: February 18, 2015 11:00 AM - 12:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1OA==\">Moving Beyond Proxies<\/a><\/p>\n<ul>\n<li>When: February 18, 2015 2:00 PM - 3:00 PM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1NA==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: February 18, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc4Mg==\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: February 18, 2015 9:30 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkyMQ==\">Join the Revolution: Advanced Endpoint Protection<\/a> [Italian]<\/p>\n<ul>\n<li>When: February 19, 2015 10:00 AM - 1:00 PM CET<\/li>\n<li>Where: Roma<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk2NA==\">Next-Generation Firewall Live Demo Webinar<\/a> [Dutch]<\/p>\n<ul>\n<li>When: February 19, 2015 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzNw==\">Ultimate Test Drive \u2013 2015<\/a> [French]<\/p>\n<ul>\n<li>When: February 19, 2015 9:00 AM - 1:00 PM CET<\/li>\n<li>Where: Issy-les-Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkwMg==\">You Can Have It All!<\/a><\/p>\n<ul>\n<li>When: February 19, 2015 8:30 AM - 11:00 AM EST<\/li>\n<li>Where: Ottawa, ON<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyNA==\">2\u670820\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: February 20, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1Nw==\">Transforming Datacenter Security - Atlanta<\/a><\/p>\n<ul>\n<li>When: February 24, 2015 10:00 AM - 1:30 PM CET<\/li>\n<li>Where: Atlanta, GA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgzNQ==\">2\u670825\u65e5(\u6c34)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: February 25, 2015 1:30 PM - 5:00 PM GMT +9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzNA==\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 11:00 AM - 12:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzAxNg==\">How to stop damaging attacks in Financial Services? Threat prevention<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 11:00 AM - 12:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1NQ==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg5Ng==\">Palo Alto's Next-Generation Security - Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 9:00 AM - 1:00 PM EST<br \/>\nWhere: Pittsburgh, PA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk3Nw==\">Protect Your Network From Today's Advanced Attack Methods<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzA0OA==\">Take the Ultimate Test Drive!<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 10:00 AM - 2:00 PM EST<\/li>\n<li>Where: Bohemia, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk2Mg==\">Transforming Datacenter Security - Charlotte<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 10:00 AM - 1:30 PM EST<\/li>\n<li>Where: Charlotte, NC<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Check out all of the top Palo Alto Networks news from this past week. &nbsp; In honor of Valentine\u2019s Day, we invite you to once again view the love story of this &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[662,120,1075,396,1074],"coauthors":[709],"class_list":["post-8166","post","type-post","status-publish","format-standard","hentry","category-news-of-the-week","tag-cyber-threat-alliance","tag-cybersecurity","tag-fuel-user-group-2","tag-ignite-2015","tag-white-house-summit"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8166"}],"version-history":[{"count":7,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8166\/revisions"}],"predecessor-version":[{"id":128731,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8166\/revisions\/128731"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8166"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}