{"id":4096,"date":"2013-11-04T19:09:53","date_gmt":"2013-11-05T03:09:53","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4096"},"modified":"2013-11-04T19:09:53","modified_gmt":"2013-11-05T03:09:53","slug":"nir-zuk-twitter-chat-thanks-playing","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2013\/11\/nir-zuk-twitter-chat-thanks-playing\/","title":{"rendered":"Our Nir Zuk Twitter Chat: Thanks For Playing!"},"content":{"rendered":"<p>We\u2019re pleased to share a full transcript of last week\u2019s <a href=\"http:\/\/www.crowdchat.net\/askpanw?sortBy=activity\" rel=\"nofollow,noopener\" >Cybersecurity Awareness Month Twitter Chat<\/a> with Nir Zuk, Palo Alto Networks founder and CTO. Read all the way through and get Nir\u2019s thoughts on everything from software-defined networking and security market disruption to whether signatures are still valuable security tools.<\/p>\n<p>Thanks to all who joined us -- we fielded tweets from six continents and 36 countries, and with participation like that, we might just be able to get Nir back behind the keyboard.<\/p>\n<p>Watch this space for future Twitter Chat activities and remember that if you have questions, you can hit us up here or <a href=\"https:\/\/twitter.com\/paloaltontwks\" rel=\"nofollow,noopener\" >@paloaltontwks<\/a> any time you like. #askPANW<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re pleased to share a full transcript of last week\u2019s Cybersecurity Awareness Month Twitter Chat with Nir Zuk, Palo Alto Networks founder and CTO. Read all the way through and get Nir\u2019s &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,133],"tags":[194],"coauthors":[],"class_list":["post-4096","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-events","tag-cybersecurity-awareness-month"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4096"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4096\/revisions"}],"predecessor-version":[{"id":4100,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4096\/revisions\/4100"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4096"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}