var varname = "wijax_407191d5a109e8456d2b79bb7b458cb4"; window[varname]="<span id=\"widget-go-widget-areas-2\" data-remove-on-inject-classes=\" \" class=\"  search-facets go-custom-widget-area_search-facets wijax-widgetclasses widget-go-widget-areas widget-area go-widget-areas-2 \"><\/span>\n<div id=\"scriblio_facets-7\" class=\"facet-technologies-and-products facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Technologies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"big data\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/big-data\/\"><span class=\"bar\" style=\"width:47.727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=big-data\" class=\"term-link\" title=\"21 topics\">big data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>21<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-computing\/\"><span class=\"bar\" style=\"width:38.636363636364%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=cloud-computing\" class=\"term-link\" title=\"17 topics\">cloud computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>17<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hadoop\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/hadoop\/\"><span class=\"bar\" style=\"width:27.272727272727%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=hadoop\" class=\"term-link\" title=\"12 topics\">Hadoop<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>12<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cybersecurity\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/\"><span class=\"bar\" style=\"width:22.727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=cybersecurity\" class=\"term-link\" title=\"10 topics\">cybersecurity<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>10<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"apache\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/apache\/\"><span class=\"bar\" style=\"width:22.727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=apache\" class=\"term-link\" title=\"10 topics\">apache<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>10<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"malware\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/malware\/\"><span class=\"bar\" style=\"width:15.909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=malware\" class=\"term-link\" title=\"7 topics\">malware<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon Web Services (AWS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/amazon-web-services-aws\/\"><span class=\"bar\" style=\"width:11.363636363636%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=amazon-web-services-aws\" class=\"term-link\" title=\"5 topics\">Amazon Web Services (AWS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"firewall\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/firewall\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=firewall\" class=\"term-link\" title=\"4 topics\">firewall<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"machine-learning\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/machine-learning\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=machine-learning\" class=\"term-link\" title=\"4 topics\">machine-learning<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"analytics\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/analytics\/\"><span class=\"bar\" style=\"width:6.8181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=analytics\" class=\"term-link\" title=\"3 topics\">analytics<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"virtualization\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/virtualization\/\"><span class=\"bar\" style=\"width:6.8181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=virtualization\" class=\"term-link\" title=\"3 topics\">virtualization<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"software as a service (SaaS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/software-as-a-service-saas\/\"><span class=\"bar\" style=\"width:6.8181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=software-as-a-service-saas\" class=\"term-link\" title=\"3 topics\">software as a service (SaaS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"NoSQL\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/nosql\/\"><span class=\"bar\" style=\"width:6.8181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=nosql\" class=\"term-link\" title=\"3 topics\">NoSQL<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"encryption\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/encryption\/\"><span class=\"bar\" style=\"width:6.8181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=encryption\" class=\"term-link\" title=\"3 topics\">encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile devices\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-devices\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=mobile-devices\" class=\"term-link\" title=\"2 topics\">mobile devices<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Databases\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/databases\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=databases\" class=\"term-link\" title=\"2 topics\">Databases<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cloud Storage\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-storage\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=cloud-storage\" class=\"term-link\" title=\"2 topics\">Cloud Storage<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"platform as a service (PaaS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/platform-as-a-service-paas\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=platform-as-a-service-paas\" class=\"term-link\" title=\"1 topics\">platform as a service (PaaS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data centers\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/data-centers\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=data-centers\" class=\"term-link\" title=\"1 topics\">data centers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"patents\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/patents\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=patents\" class=\"term-link\" title=\"1 topics\">patents<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bluetooth\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/bluetooth\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=bluetooth\" class=\"term-link\" title=\"1 topics\">Bluetooth<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Apache Ranger\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/apache-ranger\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=apache-ranger\" class=\"term-link\" title=\"1 topics\">Apache Ranger<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"small-cells\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/small-cells\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=small-cells\" class=\"term-link\" title=\"1 topics\">small-cells<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"wi-fi\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/wi-fi\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=wi-fi\" class=\"term-link\" title=\"1 topics\">wi-fi<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iCloud\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/icloud\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=icloud\" class=\"term-link\" title=\"1 topics\">iCloud<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"identity management\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/identity-management\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=identity-management\" class=\"term-link\" title=\"1 topics\">identity management<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"social media\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/social-media\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=social-media\" class=\"term-link\" title=\"1 topics\">social media<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"smartphones\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/smartphones\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=smartphones\" class=\"term-link\" title=\"1 topics\">smartphones<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"infrastructure as a service (IaaS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/infrastructure-as-a-service-iaas\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=infrastructure-as-a-service-iaas\" class=\"term-link\" title=\"1 topics\">infrastructure as a service (IaaS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"MongoDB\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mongodb\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=mongodb\" class=\"term-link\" title=\"1 topics\">MongoDB<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile data\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-data\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=mobile-data\" class=\"term-link\" title=\"1 topics\">mobile data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"natural language processing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/natural-language-processing\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=natural-language-processing\" class=\"term-link\" title=\"1 topics\">natural language processing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Apache Falcon\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/apache-falcon\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=apache-falcon\" class=\"term-link\" title=\"1 topics\">Apache Falcon<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"location-based services (LBS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/location-based-services-lbs\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;technology=location-based-services-lbs\" class=\"term-link\" title=\"1 topics\">location-based services (LBS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-6\" class=\"facet-companies facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Companies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Apache Software Foundation\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/apache-software-foundation\/\"><span class=\"bar\" style=\"width:20.454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=apache-software-foundation\" class=\"term-link\" title=\"9 topics\">Apache Software Foundation<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CloudFlare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cloudflare\/\"><span class=\"bar\" style=\"width:11.363636363636%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=cloudflare\" class=\"term-link\" title=\"5 topics\">CloudFlare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/amazon\/\"><span class=\"bar\" style=\"width:11.363636363636%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=amazon\" class=\"term-link\" title=\"5 topics\">Amazon<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sourcefire\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sourcefire\/\"><span class=\"bar\" style=\"width:6.8181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=sourcefire\" class=\"term-link\" title=\"3 topics\">Sourcefire<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"zettaset\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/zettaset\/\"><span class=\"bar\" style=\"width:6.8181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=zettaset\" class=\"term-link\" title=\"3 topics\">zettaset<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"EMC\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/emc\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=emc\" class=\"term-link\" title=\"2 topics\">EMC<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Google\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/google\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=google\" class=\"term-link\" title=\"2 topics\">Google<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cloudera\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cloudera\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=cloudera\" class=\"term-link\" title=\"2 topics\">Cloudera<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hortonworks\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/hortonworks\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=hortonworks\" class=\"term-link\" title=\"2 topics\">Hortonworks<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Accel Partners\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/accel-partners\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=accel-partners\" class=\"term-link\" title=\"1 topics\">Accel Partners<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cybereason\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cybereason\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=cybereason\" class=\"term-link\" title=\"1 topics\">Cybereason<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Alpine Data Labs\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/alpine-data-labs\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=alpine-data-labs\" class=\"term-link\" title=\"1 topics\">Alpine Data Labs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BlueTalon\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/bluetalon\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=bluetalon\" class=\"term-link\" title=\"1 topics\">BlueTalon<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Apple\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/apple\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=apple\" class=\"term-link\" title=\"1 topics\">Apple<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Merck\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/merck\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=merck\" class=\"term-link\" title=\"1 topics\">Merck<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"aetna\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/aetna\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=aetna\" class=\"term-link\" title=\"1 topics\">aetna<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Splunk\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/splunk\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=splunk\" class=\"term-link\" title=\"1 topics\">Splunk<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"unisys\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/unisys\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=unisys\" class=\"term-link\" title=\"1 topics\">unisys<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Red Hat\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/red-hat\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=red-hat\" class=\"term-link\" title=\"1 topics\">Red Hat<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"10Gen\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/10gen\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=10gen\" class=\"term-link\" title=\"1 topics\">10Gen<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"DataStax\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/datastax\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=datastax\" class=\"term-link\" title=\"1 topics\">DataStax<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"National Security Agency (NSA)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/national-security-agency-nsa\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=national-security-agency-nsa\" class=\"term-link\" title=\"1 topics\">National Security Agency (NSA)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Target\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/target\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=target\" class=\"term-link\" title=\"1 topics\">Target<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Equinix\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/equinix\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=equinix\" class=\"term-link\" title=\"1 topics\">Equinix<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"General Catalyst Partners\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/general-catalyst-partners\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=general-catalyst-partners\" class=\"term-link\" title=\"1 topics\">General Catalyst Partners<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"StopTheHacker\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/stopthehacker\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=stopthehacker\" class=\"term-link\" title=\"1 topics\">StopTheHacker<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"VMWare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/vmware\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=vmware\" class=\"term-link\" title=\"1 topics\">VMWare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"SQLStream\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sqlstream\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=sqlstream\" class=\"term-link\" title=\"1 topics\">SQLStream<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"WibiData\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/wibidata\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=wibidata\" class=\"term-link\" title=\"1 topics\">WibiData<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"XA Secure\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/xa-secure\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=xa-secure\" class=\"term-link\" title=\"1 topics\">XA Secure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"U.S. federal government\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/u-s-federal-government\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=u-s-federal-government\" class=\"term-link\" title=\"1 topics\">U.S. federal government<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Elastica\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/elastica\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=elastica\" class=\"term-link\" title=\"1 topics\">Elastica<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/microsoft\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=microsoft\" class=\"term-link\" title=\"1 topics\">Microsoft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"European Union (EU)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/european-union-eu\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=european-union-eu\" class=\"term-link\" title=\"1 topics\">European Union (EU)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Docker\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/docker\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=docker\" class=\"term-link\" title=\"1 topics\">Docker<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Gazzang\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/gazzang\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=gazzang\" class=\"term-link\" title=\"1 topics\">Gazzang<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Panda Security\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/panda-security\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=panda-security\" class=\"term-link\" title=\"1 topics\">Panda Security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Citrix\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/citrix\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=citrix\" class=\"term-link\" title=\"1 topics\">Citrix<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Akamai\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/akamai\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=akamai\" class=\"term-link\" title=\"1 topics\">Akamai<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cisco Systems\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cisco-systems\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=cisco-systems\" class=\"term-link\" title=\"1 topics\">Cisco Systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"GoGrid\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/gogrid\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;company=gogrid\" class=\"term-link\" title=\"1 topics\">GoGrid<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-11\" class=\"facet-people facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">People<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Steve Herrod\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/steve-herrod\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;person=steve-herrod\" class=\"term-link\" title=\"1 topics\">Steve Herrod<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-2\" class=\"facet-tags facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Other<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/security\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/author\/dharrisstructure\/\" class=\"term-link\" title=\"44 topics\">security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>44<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-security\/\"><span class=\"bar\" style=\"width:15.909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+cloud-security\/?authors=dharrisstructure\" class=\"term-link\" title=\"7 topics\">cloud security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hacking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/hacking\/\"><span class=\"bar\" style=\"width:15.909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+hacking\/?authors=dharrisstructure\" class=\"term-link\" title=\"7 topics\">hacking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"privacy\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/privacy\/\"><span class=\"bar\" style=\"width:13.636363636364%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+privacy\/?authors=dharrisstructure\" class=\"term-link\" title=\"6 topics\">privacy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"open source\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/open-source\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+open-source\/?authors=dharrisstructure\" class=\"term-link\" title=\"4 topics\">open source<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bromium\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/bromium\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+bromium\/?authors=dharrisstructure\" class=\"term-link\" title=\"4 topics\">Bromium<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data science\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-science\/\"><span class=\"bar\" style=\"width:6.8181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+data-science\/?authors=dharrisstructure\" class=\"term-link\" title=\"3 topics\">data science<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BYOD\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/byod\/\"><span class=\"bar\" style=\"width:6.8181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+byod\/?authors=dharrisstructure\" class=\"term-link\" title=\"3 topics\">BYOD<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"web security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/web-security\/\"><span class=\"bar\" style=\"width:6.8181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+web-security\/?authors=dharrisstructure\" class=\"term-link\" title=\"3 topics\">web security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data-security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-security\/\"><span class=\"bar\" style=\"width:6.8181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+data-security\/?authors=dharrisstructure\" class=\"term-link\" title=\"3 topics\">data-security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"national security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/national-security\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+national-security\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">national security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Simon Crosby\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/simon-crosby\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+simon-crosby\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">Simon Crosby<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"consumer cloud\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/consumer-cloud\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+consumer-cloud\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">consumer cloud<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Tenable Network Security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/tenable-network-security\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+tenable-network-security\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">Tenable Network Security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mobile-security\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+mobile-security\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">mobile security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"black hat\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/black-hat\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+black-hat\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">black hat<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"compliance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/compliance\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+compliance\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">compliance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Botnets\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/botnets\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+botnets\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">Botnets<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"network security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/network-security\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+network-security\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">network security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Silver Tail Systems\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/silver-tail-systems\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+silver-tail-systems\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">Silver Tail Systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Terrorism\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/terrorism\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+terrorism\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">Terrorism<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iptrust\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/iptrust\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+iptrust\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">iptrust<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"copyright\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/copyright\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+copyright\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">copyright<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"lulzsec\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/lulzsec\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+lulzsec\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">lulzsec<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"web firewall\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/web-firewall\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+web-firewall\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">web firewall<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"stream processing\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/stream-processing\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+stream-processing\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">stream processing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"legal issues\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/legal-issues\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+legal-issues\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">legal issues<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"video surveillance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/video-surveillance\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+video-surveillance\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">video surveillance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"consumerization\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/consumerization\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+consumerization\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">consumerization<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"denial-of-service (DoS)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/denial-of-service-dos\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+denial-of-service-dos\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">denial-of-service (DoS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud adoption\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-adoption\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+cloud-adoption\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">cloud adoption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Storm\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/storm\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+storm\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Storm<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"sqrrl\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/sqrrl\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+sqrrl\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">sqrrl<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Accumulo\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/accumulo\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+accumulo\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Accumulo<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"anti-malware\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/anti-malware\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+anti-malware\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">anti-malware<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Stop Online Piracy Act (SOPA)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/stop-online-piracy-act-sopa\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+stop-online-piracy-act-sopa\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Stop Online Piracy Act (SOPA)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PHP Fog\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/php-fog\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+php-fog\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">PHP Fog<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"web performance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/web-performance\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+web-performance\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">web performance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mass surveillance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mass-surveillance\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+mass-surveillance\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Mass surveillance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"latency\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/latency\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+latency\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">latency<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"security breaches\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/security-breaches\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+security-breaches\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">security breaches<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"containers\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/containers\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+containers\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">containers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BeyondCore\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/beyondcore\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+beyondcore\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">BeyondCore<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud-insurance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-insurance\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+cloud-insurance\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">cloud-insurance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"law\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/law\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+law\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">law<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Tom Gillis\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/tom-gillis\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+tom-gillis\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Tom Gillis<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mobilize 2011\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mobilize-2011\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+mobilize-2011\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Mobilize 2011<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"network\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/network\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+network\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">network<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Data Governance Initiative\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-governance-initiative\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+data-governance-initiative\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Data Governance Initiative<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hacktivism\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/hacktivism\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security+hacktivism\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">hacktivism<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-8\" class=\"facet-author widget widget_scriblio_facets\"><header class=\"widget-title\">Author<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"Derrick Harris\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/dharrisstructure\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/\" class=\"term-link\" title=\"44 topics\">Derrick Harris<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>44<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-3\" class=\"facet-post-type widget widget_scriblio_facets\"><header class=\"widget-title\">Content Type<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/news-post\/\"><span class=\"bar\" style=\"width:95.454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;go-type=news-post\" class=\"term-link\" title=\"42 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>42<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/blog-post\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;go-type=blog-post\" class=\"term-link\" title=\"1 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"audio\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/audio\/\"><span class=\"bar\" style=\"width:2.2727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;go-type=audio\" class=\"term-link\" title=\"1 topics\">audio<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-5\" class=\"facet-property widget widget_scriblio_facets\"><header class=\"widget-title\">Property<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Gigaom\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/gigaom\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;go-property=gigaom\" class=\"term-link\" title=\"44 topics\">Gigaom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>44<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-10\" class=\"facet-availability widget widget_scriblio_facets\"><header class=\"widget-title\">Access<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Free\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/free\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?authors=dharrisstructure&#038;go-availability=free\" class=\"term-link\" title=\"44 topics\">Free<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>44<\/span><\/a><\/li>\n<\/ul>\n<\/div>";
