{"id":17188,"date":"2016-08-15T05:00:35","date_gmt":"2016-08-15T12:00:35","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=17188"},"modified":"2016-08-22T15:53:19","modified_gmt":"2016-08-22T22:53:19","slug":"content-that-respects-the-value-of-your-time","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2016\/08\/content-that-respects-the-value-of-your-time\/","title":{"rendered":"Content That Respects the Value of Your Time"},"content":{"rendered":"<p>With so much content in every direction vying for your attention, we believe that content is now required to respect the value of your time. For this reason, I\u2019m really excited to introduce you to <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\" target=\"_blank\"><strong>Info &amp; Insights<\/strong><\/a> at Palo Alto Networks!<!--more--><\/p>\n<h3>Introducing Info &amp; Insights<\/h3>\n<p>We know that when you are in the process of making important purchases for your organization, you are most likely doing your own research online and through your own networks. You\u2019re looking for educational content to help you make informed, sensible purchasing decisions. Everything else is just a distraction.<\/p>\n<p>That is why the Content Marketing team here at Palo Alto Networks has been laser focused on creating market-driven, topical content designed to educate, enable and empower the cybersecurity industry.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\" target=\"_blank\"><strong>Info &amp; Insights<\/strong><\/a>, now available as a Palo Alto Networks resource, comprises a plethora of concise and educational assets that addresses industry pain-points and provides thoughtful best practices and recommendations. Rather than being focused on selling product features, the content marketing pieces you\u2019ll find on <strong>Info &amp; Insights<\/strong> are intended to build and maintain your trust in it as an information resource. Following are a few examples for your reference:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\/ransomware-common-attack-methods\" target=\"_blank\">Ransomware Common Attack Methods<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\/minimizing-risk-at-the-board-level\" target=\"_blank\">Minimizing Risk at the Board Level<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\/cloud-security-data-center\" target=\"_blank\">Top 3 Security Considerations for the Cloud<\/a><\/li>\n<\/ul>\n<h3>Gaining Your Trust Through Thought Leadership<\/h3>\n<p>At Palo Alto Networks, we believe that brand loyalty begins with awareness and trust. And trust is established through thought leadership and education. Our goal is to create lasting business relationships and offer you insightful content that respects your time.<\/p>\n<p>Check out <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\" target=\"_blank\"><strong>Info &amp; Insights<\/strong><\/a> to learn about the latest issues and trends impacting the cybersecurity industry, and what your organization can do to help prevent security breaches and successful cyberattacks.<\/p>\n<p>Please let me know if you have any comments or questions, or contact me via Twitter anytime at\u00a0<a href=\"https:\/\/twitter.com\/CicconeScott\" rel=\"nofollow,noopener\" >@CicconeScott<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With so much content in every direction vying for your attention, we believe that content is now required to respect the value of your time. For this reason, I\u2019m really excited to &hellip;<\/p>\n","protected":false},"author":121,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,155],"tags":[2521],"coauthors":[1118],"class_list":["post-17188","post","type-post","status-publish","format-standard","hentry","category-announcement","category-cybersecurity-2","tag-info-insights"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/17188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/121"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=17188"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/17188\/revisions"}],"predecessor-version":[{"id":17524,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/17188\/revisions\/17524"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=17188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=17188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=17188"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=17188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}