{"id":9074,"date":"2015-05-14T11:30:52","date_gmt":"2015-05-14T18:30:52","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9074"},"modified":"2015-05-14T11:35:56","modified_gmt":"2015-05-14T18:35:56","slug":"new-episode-of-dont-panic-cybersecurity-canon-2015-inductees","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/05\/new-episode-of-dont-panic-cybersecurity-canon-2015-inductees\/","title":{"rendered":"New Episode of Don\u2019t Panic: Cybersecurity Canon 2015 Inductees"},"content":{"rendered":"<p style=\"text-align: left;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast.jpg\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignleft wp-image-8960 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-230x230.jpg\" alt=\"unit 42 podcast\" width=\"230\" height=\"230\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-230x230.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-500x500.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-300x300.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-40x40.jpg 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-32x32.jpg 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-64x64.jpg 64w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-96x96.jpg 96w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-128x128.jpg 128w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast.jpg 2048w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/a><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/unit-42-podcast\/id990249386\" rel=\"nofollow,noopener\"  target=\"_blank\">This month\u2019s episode<\/a> of\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/dont-panic-unit-42-podcast\/\" target=\"_blank\">Don\u2019t Panic<\/a>\u00a0takes you inside the\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\">Cybersecurity Canon<\/a>. At this year\u2019s\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/save-the-date-for-ignite-2016\/\" target=\"_blank\">Ignite conference<\/a>, Palo Alto Networks announced four new inductees to the\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\" target=\"_blank\">Canon<\/a>, which endeavors to\u00a0recognize authors and works of literature that accurately depict the history, milestones and culture of the modern cybersecurity industry.\u00a0 Ignite attendees also had the opportunity to meet several of the authors\u00a0and speak with them about their research and experiences.<\/p>\n<p><!--more--><\/p>\n<p><strong><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/unit-42-podcast\/id990249386%20\" rel=\"nofollow,noopener\"  target=\"_blank\">Listen<\/a> to this episode to hear:<\/strong><\/p>\n<ul>\n<li>Which entries made it into the Cybersecurity Canon this year<\/li>\n<li>Brian Krebs, author of \u201cSpam Nation,\u201d on his interaction with Russian spam kingpins<\/li>\n<li>Rich Baich, author of \u201cWinning as a CISO,\u201d on the role of CISO at a major corporation<\/li>\n<\/ul>\n<p><strong>More from the Don\u2019t Panic podcast:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/unit-42-podcast\/id990249386\" rel=\"nofollow,noopener\"  target=\"_blank\">Episode 1 -- Cybersecurity Information Sharing<\/a><\/li>\n<li><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/unit-42-podcast\/id990249386\" rel=\"nofollow,noopener\"  target=\"_blank\">Episode 2 -- Backdoored Cryptographic Systems<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This month\u2019s episode of\u00a0Don\u2019t Panic\u00a0takes you inside the\u00a0Cybersecurity Canon. At this year\u2019s\u00a0Ignite conference, Palo Alto Networks announced four new inductees to the\u00a0Canon, which endeavors to\u00a0recognize authors and works of literature that accurately &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,99,112],"tags":[245,251,1105,1003,1104],"coauthors":[709],"class_list":["post-9074","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-ignite","category-interview","tag-brian-krebs","tag-cybersecurity-canon","tag-dont-panic","tag-rich-baich","tag-unit-42-podcast"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9074"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9074\/revisions"}],"predecessor-version":[{"id":9098,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9074\/revisions\/9098"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9074"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}