{"id":8239,"date":"2015-02-21T05:00:49","date_gmt":"2015-02-21T13:00:49","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8239"},"modified":"2015-12-08T16:43:17","modified_gmt":"2015-12-09T00:43:17","slug":"palo-alto-networks-news-week-february-21","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/02\/palo-alto-networks-news-week-february-21\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 February 21"},"content":{"rendered":"<p>Check out all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\">Palo Alto Networks news<\/a> from this past week.<\/p>\n<p>&nbsp;<\/p>\n<p>The first post in our new blog series titled 'Examining the Cybercrime Underground' <a href=\"http:\/\/bit.ly\/1COTkrk\" rel=\"nofollow,noopener\"  target=\"_blank\">explores \"crypters,\"<\/a> software tools that use encryption, obfuscation, and code manipulation of malware to make them \u201cfully undetectable\u201d by legacy security products.<\/p>\n<p>Joerg Sieber <a href=\"http:\/\/bit.ly\/1El64pu\" rel=\"nofollow,noopener\"  target=\"_blank\">discusses<\/a> big data and the security employment shortage, and gives tips on how to cut back on the noise in your network.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1yU5R81\" rel=\"nofollow,noopener\"  target=\"_blank\">Find out how<\/a> Palo Alto Networks Traps would prevent techniques used in Carbanak campaign.<!--more--><\/p>\n<p>Here are some <a href=\"http:\/\/bit.ly\/1EM4UmE\" rel=\"nofollow,noopener\"  target=\"_blank\">tips<\/a> to help protect against healthcare breaches.<\/p>\n<p>Don\u2019t fight the good fight alone - <a href=\"http:\/\/bit.ly\/17qZmTL\" rel=\"nofollow,noopener\"  target=\"_blank\">Join the Fuel User Group today<\/a> for access to a wealth of collective knowledge on cybersecurity. Let Fuel be your new source for solving your most difficult cybersecurity challenges.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:48.7%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-8121 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/Az-zMYLI_400x4001-230x112.jpeg\" alt=\"Az-zMYLI_400x400\" width=\"230\" height=\"112\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/Az-zMYLI_400x4001-230x112.jpeg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/Az-zMYLI_400x4001-81x40.jpeg 81w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/Az-zMYLI_400x4001.jpeg 400w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/p>\n<p>Get the cybersecurity content you can\u2019t afford to miss at <a href=\"http:\/\/bit.ly\/1w5QI9e\" rel=\"nofollow,noopener\"  target=\"_blank\">Ignite 2015<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:30.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8237 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200-500x151.jpg\" alt=\"email_banner_PAN_Ignite_660x200\" width=\"500\" height=\"151\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200-500x151.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200-230x69.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200-510x154.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200-132x40.jpg 132w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/email_banner_PAN_Ignite_660x200.jpg 660w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Attend our <a href=\"http:\/\/bit.ly\/1viWIuv\" rel=\"nofollow,noopener\"  target=\"_blank\">Executive Roundtable Breakfast on February 25<\/a> for your chance to help shape security in 2015 and connect with industry leaders, including Palo Alto Networks CSO Rick Howard.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8145 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg1-500x61.jpg\" alt=\"phpThumb_generated_thumbnailjpg\" width=\"500\" height=\"61\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg1-500x61.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg1-230x28.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg1-510x63.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg1-240x29.jpg 240w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/phpThumb_generated_thumbnailjpg1.jpg 728w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>You can have Unit 42 blog posts, research and white papers delivered straight to your inbox the minute they're posted. <a href=\"http:\/\/bit.ly\/1DF37kZ\" rel=\"nofollow,noopener\"  target=\"_blank\">Sign up for a free subscription today<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7596 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png\" alt=\"blog-title-unit42\" width=\"500\" height=\"68\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-230x31.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-510x69.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-240x32.png 240w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png 632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1Nw==\" target=\"_blank\">Transforming Datacenter Security - Atlanta<\/a><\/p>\n<ul>\n<li>When: February 24, 2015 10:00 AM - 1:30 PM EST<\/li>\n<li>Where: Atlanta, GA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgzNQ==\" target=\"_blank\">2\u670825\u65e5(\u6c34)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: February 25, 2015 1:30 PM - 5:00 PM GMT +9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzNA==\" target=\"_blank\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 11:00 AM - 12:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzAxNg==\" target=\"_blank\">How to stop damaging attacks in Financial Services? Threat prevention<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 11:00 AM - 12:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk1NQ==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg5Ng==\" target=\"_blank\">Palo Alto's Next-Generation Security - Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 9:00 AM - 1:00 PM EST<\/li>\n<li>Where: Pittsburgh, PA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk3Nw==\" target=\"_blank\">Protect Your Network From Today's Advanced Attack Methods<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzA0OA==\" target=\"_blank\">Take the Ultimate Test Drive!<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 10:00 AM - 2:00 PM EST<\/li>\n<li>Where: Bohemia, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk2Mg==\" target=\"_blank\">Transforming Datacenter Security - Charlotte<\/a><\/p>\n<ul>\n<li>When: February 25, 2015 10:00 AM - 1:30 PM EST<\/li>\n<li>Where: Charlotte, NC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzA0NQ==\" target=\"_blank\">Hear from the Palo Alto Networks team on Advanced Threats<\/a><\/p>\n<ul>\n<li>When: February 26, 2015 9:00 AM - 2:00 PM GMT+4:00<\/li>\n<li>Where: Dubai<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgxMg==\" target=\"_blank\">Transforming Datacenter Security - Pittsburgh, PA<\/a><\/p>\n<ul>\n<li>When: February 26, 2015 8:30 AM - 1:30 PM EST<\/li>\n<li>Where: Pittsburgh, PA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk2Mw==\" target=\"_blank\">Transforming Datacenter Security \u2013 Raleigh<\/a><\/p>\n<ul>\n<li>When: February 26, 2015 10:00 AM - 1:30 PM EST<\/li>\n<li>Where: Durham, NC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzOA==\" target=\"_blank\">Ultimate Test Drive \u2013 2015<\/a> [French]<\/p>\n<ul>\n<li>When: February 26, 2015 9:00 AM - 1:00 PM CET<\/li>\n<li>Where: Issy-les-Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyNQ==\" target=\"_blank\">2\u670827\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: February 27, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk3OQ==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: March 4, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg2Mg==\" target=\"_blank\">Virtual Data Centre Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: March 4, 2015 10:00 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzA0Mw==\" target=\"_blank\">Turning a Corner - Security and the Cloud<\/a><\/p>\n<ul>\n<li>When: March 5, 2015 3:30 PM - 4:30 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyNg==\" target=\"_blank\">3\u67086\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: March 6, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Check out all of the top Palo Alto Networks news from this past week. &nbsp; The first post in our new blog series titled 'Examining the Cybercrime Underground' explores \"crypters,\" software tools &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1067,396],"coauthors":[709],"class_list":["post-8239","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-fuel","tag-ignite-2015"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8239"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8239\/revisions"}],"predecessor-version":[{"id":11291,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8239\/revisions\/11291"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8239"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}