{"id":8032,"date":"2015-02-01T03:00:32","date_gmt":"2015-02-01T11:00:32","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8032"},"modified":"2015-02-09T09:14:49","modified_gmt":"2015-02-09T17:14:49","slug":"vote-now-cybersecurity-canon","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/02\/vote-now-cybersecurity-canon\/","title":{"rendered":"Vote Now for The Cybersecurity Canon"},"content":{"rendered":"<p>Voting is now open for this year's inductees into The Cybersecurity Canon\u00a0\u2014\u00a0and your vote counts!<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:60.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-7984 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC.jpg\" alt=\"PAN_BlogHeader_Cybersecurity Canon\" width=\"500\" height=\"303\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC-230x139.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC-495x300.jpg 495w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC-66x40.jpg 66w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><!--more--><\/p>\n<p>Please visit our\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\" target=\"_blank\">Cybersecurity Canon website<\/a>, take a look at the list of 25 nominated books and cast your vote for the one you think every cybersecurity professional should read. Whether it\u2019s a more technical guide, a historical analysis or a\u00a0great hacker novel, all of these nominated books provide insights into the world of cybersecurity. But we want your vote on the best of the best\u00a0\u2014\u00a0the books that, if not read, would leave a hole in a cybersecurity professional's education.<\/p>\n<p><strong>Voting ends February 28<\/strong>. We will induct the winners into the Canon at an Awards Ceremony during our annual\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/2015\/index.html\" target=\"_blank\">Ignite Conference<\/a>\u00a0in Las Vegas on April 1, 2015.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Voting is now open for this year's inductees into The Cybersecurity Canon\u00a0\u2014\u00a0and your vote counts!<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,99],"tags":[251,396],"coauthors":[791],"class_list":["post-8032","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-ignite","tag-cybersecurity-canon","tag-ignite-2015"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8032"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8032\/revisions"}],"predecessor-version":[{"id":8133,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8032\/revisions\/8133"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8032"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}