LAS VEGAS, April 4, 2016 – Palo Alto Networks® (NYSE: PANW), the leader in next-generation security, today announced the 2016 Cybersecurity Canon award winners. The Cybersecurity Canon honors authors and works of literature that accurately depict the history, milestones and culture of the modern cybersecurity industry.

Winning authors and books were honored during the opening reception of Ignite 2016, the Palo Alto Networks annual user conference where thousands of next-generation security professionals learn how a breach prevention-minded approach to cybersecurity is changing the industry.

The 2016 Cybersecurity Canon inductees include: 

  • “The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes” by Dawn M. Cappelli, Andrew P. Moore and Randall F. Trzeciak
  • “Cyber War: The Next Threat to National Security and What to Do About It” by Richard A. Clarke and Robert K. Knake
  • “Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It” by Marc Goodman
  • “@War: The Rise of the Military-Internet Complex” by Shane Harris
  • “Measuring and Managing Information Risk: A FAIR Approach” by Jack Freund and Jack Jones
  • “Kingpin” by Kevin Poulsen
  • “Zero Day” by Mark Russinovich
  • “Tallinn Manual on the International Law Applied to Cyber Warfare,” edited by Michael Schmitt


  • “The Cybersecurity Canon continues to mature into a highly curated list of ‘must-read’ books in which the content is timeless, genuinely represents an aspect of our community that is true and precise, and, if not read, represents a cybersecurity professional’s missed opportunity to broaden their perspective. We are thrilled to induct these authors and their books into the Canon today, and we thank them for their contributions to this list of books every cybersecurity professional should read.”  

- Rick Howard, CSO, Palo Alto Networks

About the Cybersecurity Canon

Launched in 2014 by Chief Security Officer Rick Howard of Palo Alto Networks, the Cybersecurity Canon aims to promote the continued education of cybersecurity professionals by providing a curated list of both fiction and non-fiction works that advance the discussion of modern industry issues. A Cybersecurity Canon advisory board of tenured researchers, industry professionals and journalists who have devoted their careers to the field of cybersecurity meets during the year to vote on new inclusions and future honorees. Nominees for the Canon awards are selected by the committee. Practitioners are also invited to vote for nominees as part of the selection process. 

Additional Information:

About Palo Alto Networks

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide.  Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets.  Find out more at

Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Media Contacts:

Brittany Stagnaro
Americas PR & AR Manager
Palo Alto Networks


What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users by flooding it with traffic.
  • 3
  • 60258

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 86
  • 239861

What is an Intrusion Prevention System?

An Intrusion Prevention System (IPS) is a network security prevention technology that examines network traffic flow to detect and prevent vulnerability exploits
  • 5
  • 109906

What is a Zero Trust Architecture?

Businesses who want to prevent the exfiltration of sensitive data and improve their defense against modern cyber threats can consider a Zero Trust architecture.
  • 1
  • 41210

What is Cybersecurity?

Cybersecurity refers to the preventative techniques used to protect the integrity of networks, programs and data from attack, damage, or unauthorized access.
  • 4
  • 83349

PA-5200 Series Datasheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances is comprised of the PA-5280, PA-5260, PA-5250 and PA-5220.
  • 21
  • 90129