{"id":12793,"date":"2016-03-21T05:00:21","date_gmt":"2016-03-21T12:00:21","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=12793"},"modified":"2016-03-17T18:14:31","modified_gmt":"2016-03-18T01:14:31","slug":"the-polls-are-open-vote-for-the-cybersecurity-canon-week-6","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/03\/the-polls-are-open-vote-for-the-cybersecurity-canon-week-6\/","title":{"rendered":"THE POLLS ARE OPEN: VOTE FOR THE CYBERSECURITY CANON (Week 6)"},"content":{"rendered":"<p>Week 6 of voting is now open for this year\u2019s inductees into <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\">The Cybersecurity Canon<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11567 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-500x218.png\" alt=\"cybersec-canon-red-500x218\" width=\"500\" height=\"218\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-230x100.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-92x40.png 92w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>To get you ready for the upcoming March Madness, we\u2019re shaking things up and doing voting bracket competition style!<\/p>\n<h3>Here\u2019s how it works:<\/h3>\n<p><!--more--><\/p>\n<ul>\n<li>The polls will run for six weeks starting on Monday, February 15 and continuing through Friday, March 25.<\/li>\n<li>A new bracket will be posted on the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/02\/vote-now-cybersecurity-canon\/\" target=\"_blank\">Palo Alto Networks blog<\/a> every Monday. Voting will remain open through Friday of the same week. <em>Come back each week to cast your vote on the new brackets. <\/em><\/li>\n<li>Each week the winners move on to the next round until only one book is left.<\/li>\n<li>The winner will be inducted into The Cybersecurity Canon at our annual Ignite Conference in Las Vegas.<\/li>\n<\/ul>\n<p>We have 36 nominated books this year. Vote for your Cybersecurity Canon champion now!<\/p>\n<div id=\"wufoo-wqtlpbd0xeie24\">Fill out my <a href=\"https:\/\/cybersecuritycanon.wufoo.com\/forms\/wqtlpbd0xeie24\" rel=\"nofollow,noopener\" >online form<\/a>.<\/div>\n<div><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2016\" target=\"_blank\" rel=\"attachment wp-att-12021\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-12021 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-500x167.png\" alt=\"Ignite 2016 register now\" width=\"500\" height=\"167\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-500x167.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-230x77.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-510x170.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-120x40.png 120w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now.png 900w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/div>\n<p><script type=\"text\/javascript\">\/\/ <![CDATA[\nvar wqtlpbd0xeie24;(function(d, t) { var s = d.createElement(t), options = { 'userName':'cybersecuritycanon', 'formHash':'wqtlpbd0xeie24', 'autoResize':true, 'height':'351', 'async':true, 'host':'wufoo.com', 'header':'show', 'ssl':true}; s.src = ('https:' == d.location.protocol ? 'https:\/\/' : 'http:\/\/') + 'www.wufoo.com\/scripts\/embed\/form.js'; s.onload = s.onreadystatechange = function() { var rs = this.readyState; if (rs) if (rs != 'complete') if (rs != 'loaded') return; try { wqtlpbd0xeie24 = new WufooForm();wqtlpbd0xeie24.initialize(options);wqtlpbd0xeie24.display(); } catch (e) {}}; var scr = d.getElementsByTagName(t)[0], par = scr.parentNode; par.insertBefore(s, scr); })(document, 'script');\n\/\/ ]]><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Week 6 of voting is now open for this year\u2019s inductees into The Cybersecurity Canon. To get you ready for the upcoming March Madness, we\u2019re shaking things up and doing voting bracket &hellip;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,99],"tags":[251,1133],"coauthors":[791],"class_list":["post-12793","post","type-post","status-publish","format-standard","hentry","category-announcement","category-ignite","tag-cybersecurity-canon","tag-ignite-2016"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=12793"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12793\/revisions"}],"predecessor-version":[{"id":12796,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12793\/revisions\/12796"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=12793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=12793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=12793"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=12793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}