{"id":8572,"date":"2015-04-02T05:00:53","date_gmt":"2015-04-02T12:00:53","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8572"},"modified":"2017-05-08T15:01:59","modified_gmt":"2017-05-08T22:01:59","slug":"congratulations-to-this-years-cybersecurity-canon-honorees","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/04\/congratulations-to-this-years-cybersecurity-canon-honorees\/","title":{"rendered":"Congratulations To This Year's Cybersecurity Canon Honorees!"},"content":{"rendered":"<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:60.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-7984 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC.jpg\" alt=\"PAN_BlogHeader_Cybersecurity Canon\" width=\"500\" height=\"303\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC-230x139.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC-495x300.jpg 495w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_BlogHeader_CSC-66x40.jpg 66w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>This week at Ignite 2015 we inducted four new honorees to the <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\" target=\"_blank\">Cybersecurity Canon<\/a>.\u00a0If you've been a regular reader of our <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\">Cybersecurity Canon reviews<\/a>, you know that what we're trying to do is to recognize authors and works of literature that accurately depict the history, milestones and culture of the modern cybersecurity industry.<\/p>\n<p>Please join me in congratulating this year's honorees:<!--more--><\/p>\n<ul>\n<li><strong>Cyber Crime:<\/strong> Brian Krebs, <em>Spam Nation<\/em><\/li>\n<li><strong>Cyber Espionage:<\/strong> Clifford Stoll, <em>The Cuckoo's Egg<\/em><\/li>\n<li><strong>Cyber History and Culture:<\/strong> Rich Baich, <em>Winning as a CISO<\/em><\/li>\n<li><strong>Cyber Warfare:<\/strong> Kim Zetter, <em>Countdown to Zero Day<\/em><\/li>\n<\/ul>\n<p>The Cybersecurity Canon advisory board includes tenured researchers, industry professionals and journalists who have devoted their careers to the field of cybersecurity. The advisory board meets during the year to vote on new inclusions and future honorees. You can see the full list of this year's advisory board members <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/cyber-security-canon-bios.html\" target=\"_blank\">here<\/a>.<\/p>\n<p>One of our goals is that every year the Canon will continue to mature into a highly curated list of \"must read\" cybersecurity books. <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\" target=\"_blank\">Visit the Cybersecurity Canon<\/a> to learn more about our nomination process and about how to submit reviews of your favorite books for consideration.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week at Ignite 2015 we inducted four new honorees to the Cybersecurity Canon.\u00a0If you've been a regular reader of our Cybersecurity Canon reviews, you know that what we're trying to do &hellip;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,155,99],"tags":[245,257,251,3717,396,1040,1003],"coauthors":[791],"class_list":["post-8572","post","type-post","status-publish","format-standard","hentry","category-announcement","category-cybersecurity-2","category-ignite","tag-brian-krebs","tag-clifford-stoll","tag-cybersecurity-canon","tag-cybersecurity-canon-awards","tag-ignite-2015","tag-kim-zetter","tag-rich-baich"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8572"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8572\/revisions"}],"predecessor-version":[{"id":8584,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8572\/revisions\/8584"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8572"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}