{"id":9531,"date":"2015-06-25T14:00:44","date_gmt":"2015-06-25T21:00:44","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9531"},"modified":"2015-06-25T09:45:46","modified_gmt":"2015-06-25T16:45:46","slug":"episode-4-of-dont-panic-cyber-attack-attribution","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/06\/episode-4-of-dont-panic-cyber-attack-attribution\/","title":{"rendered":"Episode 4 of Don't Panic: Cyber Attack Attribution"},"content":{"rendered":"<p>I<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast.jpg\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignleft wp-image-8960 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-100x100.jpg\" alt=\"unit 42 podcast\" width=\"140\" height=\"140\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-100x100.jpg 100w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-230x230.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-500x500.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-300x300.jpg 300w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-40x40.jpg 40w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-32x32.jpg 32w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-64x64.jpg 64w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-96x96.jpg 96w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-128x128.jpg 128w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast.jpg 2048w\" sizes=\"auto, (max-width: 140px) 100vw, 140px\" \/><\/a>n <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/dont-panic-cyber-attack-attribution\/id990249386?i=345163978&amp;mt=2\" rel=\"nofollow,noopener\"  target=\"_blank\">this month\u2019s episode<\/a> of Unit 42\u2019s podcast, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/dont-panic\/\" target=\"_blank\">Don\u2019t Panic<\/a>, Rick Howard and Ryan Olson discuss cyber attack\u00a0attribution, its many components and how it can be valuable to different organizations.\u00a0The two also cover\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/01\/cybersecurity-canon-reamde\/\" target=\"_blank\">Neal Stephenson's 2011 novel \"Reamde,\"<\/a> and how the author used the concept of cyber attack\u00a0attribution to drive the plot in this <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\" target=\"_blank\">Cybersecurity Canon candidate<\/a>.<!--more--><\/p>\n<h3>More from the Don\u2019t Panic podcast series<\/h3>\n<ul>\n<li><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/dont-panic-cybersecurity-information\/id990249386?i=340917118&amp;mt=2\" rel=\"nofollow,noopener\"  target=\"_blank\">Episode 1 \u2013 Cybersecurity Information Sharing<\/a><\/li>\n<li><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/dont-panic-backdoored-cryptographic\/id990249386?i=340917119&amp;mt=2\" rel=\"nofollow,noopener\"  target=\"_blank\">Episode 2 \u2013 Backdoored Cryptographic Systems<\/a><\/li>\n<li><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/dont-panic-cybersecurity-canon\/id990249386?i=342163562&amp;mt=2\" rel=\"nofollow,noopener\"  target=\"_blank\">Episode 3 \u2013 Cybersecurity Canon 2015 Inductees<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In this month\u2019s episode of Unit 42\u2019s podcast, Don\u2019t Panic, Rick Howard and Ryan Olson discuss cyber attack\u00a0attribution, its many components and how it can be valuable to different organizations.\u00a0The two also &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,112],"tags":[251,1105,254,302,345,1104],"coauthors":[709],"class_list":["post-9531","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-interview","tag-cybersecurity-canon","tag-dont-panic","tag-neal-stephenson","tag-reamde","tag-rick-howard","tag-unit-42-podcast"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9531"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9531\/revisions"}],"predecessor-version":[{"id":9542,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9531\/revisions\/9542"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9531"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}