{"id":45396,"date":"2017-10-09T05:00:27","date_gmt":"2017-10-09T12:00:27","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=45396"},"modified":"2017-10-07T20:33:45","modified_gmt":"2017-10-08T03:33:45","slug":"2018-cybersecurity-canon-peoples-choice-awards-vote-now-round-3","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/10\/2018-cybersecurity-canon-peoples-choice-awards-vote-now-round-3\/","title":{"rendered":"2018 Cybersecurity Canon People\u2019s Choice Awards: Vote Now for Round 3"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:43.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-32398 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png\" alt=\"cybersecuity-canon-blog-600x260\" width=\"600\" height=\"260\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>We\u2019re nearly halfway through our annual <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/09\/welcome-2018-cybersecurity-canon-peoples-choice-awards\/\">People\u2019s Choice Awards<\/a> competition, where YOU get to pick which book gets inducted into the Cybersecurity Canon Hall of Fame. If you\u2019re just hearing about the Cybersecurity Canon for the first time, this project is similar to the Rock and Roll Hall of Fame. We have an outside committee of 15 network defenders who read cybersecurity books and write reviews that make the case that a particular book should or should not be read by the entire network defender community.<\/p>\n<p><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/vote2018\/\"><strong>Vote Now for the 2018 People\u2019s Choice Awards<\/strong><\/a><\/p>\n<p>We\u2019re down to eight contenders for Round 3 of voting. <a href=\"https:\/\/cybercanon.paloaltonetworks.com\/vote2018\"><strong>Go here to vote<\/strong><\/a><strong>,<\/strong>\u00a0and tell your friends and every other cybersecurity book lover you know to do the same to ensure your favorite cybersecurity book makes the cut. There are only three weeks left so be sure to check back each week to see who is winning and make your choices known for the next Hall of Fame winner in the Cybersecurity Canon. We will announce this year\u2019s People\u2019s Choice winner on October 31.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vote now for round 3 of the 2018 Cybersecurity Canon People\u2019s Choice Awards<\/p>\n","protected":false},"author":43,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,4521],"tags":[251,4440],"coauthors":[791],"class_list":["post-45396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-canon","tag-cybersecurity-canon","tag-peoples-choice-awards"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/45396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=45396"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/45396\/revisions"}],"predecessor-version":[{"id":45402,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/45396\/revisions\/45402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=45396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=45396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=45396"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=45396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}