{"id":46926,"date":"2017-10-23T05:00:07","date_gmt":"2017-10-23T12:00:07","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=46926"},"modified":"2017-10-20T08:37:36","modified_gmt":"2017-10-20T15:37:36","slug":"last-two-contestants-2018-cybersecurity-canon-peoples-choice-awards","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/10\/last-two-contestants-2018-cybersecurity-canon-peoples-choice-awards\/","title":{"rendered":"We\u2019re Down to the Last Two Contestants In the 2018 Cybersecurity Canon People\u2019s Choice Awards!"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:43.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-32398 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png\" alt=\"cybersecuity-canon-blog-600x260\" width=\"600\" height=\"260\" \/><\/span><\/div><\/p>\n<p>Thirty three books entered, and two remain! There\u2019s only one week left to participate in the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/09\/welcome-2018-cybersecurity-canon-peoples-choice-awards\/\">People\u2019s Choice Awards<\/a> competition, where YOU get to pick which book gets inducted into the Cybersecurity Canon Hall of Fame.<\/p>\n<p>If you\u2019re just hearing about the Cybersecurity Canon for the first time, this project is similar to the Rock and Roll Hall of Fame. We have an outside committee of 15 network defenders who read cybersecurity books and write reviews that make the case that a particular book should or should not be read by the entire network defender community.<\/p>\n<p><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/vote2018\/\"><strong>Vote Now for the 2018 People\u2019s Choice Awards<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/vote2018\"><strong>Go here to vote<\/strong><\/a><strong>,<\/strong>\u00a0and tell your friends and every other cybersecurity book lover you know to do the same to ensure your favorite cybersecurity book makes the cut. There is only one week left so be sure to make your choices known for the next Hall of Fame winner in the Cybersecurity Canon. We will announce this year\u2019s People\u2019s Choice winner next week, on October 31.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We're down to the last 2 contestants in the 2018 Cybersecurity Canon People's Choice Awards! Vote for this year's winner.<\/p>\n","protected":false},"author":43,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,4521],"tags":[251,4440],"coauthors":[791],"class_list":["post-46926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-canon","tag-cybersecurity-canon","tag-peoples-choice-awards"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/46926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=46926"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/46926\/revisions"}],"predecessor-version":[{"id":46929,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/46926\/revisions\/46929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=46926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=46926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=46926"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=46926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}