var varname = "wijax_3605091a7d93266569a745ad352e4c54"; window[varname]="<span id=\"widget-go-widget-areas-2\" data-remove-on-inject-classes=\" \" class=\"  search-facets go-custom-widget-area_search-facets wijax-widgetclasses widget-go-widget-areas widget-area go-widget-areas-2 \"><\/span>\n<div id=\"scriblio_facets-7\" class=\"facet-technologies-and-products facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Technologies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"cybersecurity\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"\" class=\"term-link\" title=\"108 topics\">cybersecurity<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>108<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"big data\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/big-data\/\"><span class=\"bar\" style=\"width:17.592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+big-data\/\" class=\"term-link\" title=\"19 topics\">big data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>19<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-computing\/\"><span class=\"bar\" style=\"width:12.962962962963%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+cloud-computing\/\" class=\"term-link\" title=\"14 topics\">cloud computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>14<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"malware\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/malware\/\"><span class=\"bar\" style=\"width:10.185185185185%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+malware\/\" class=\"term-link\" title=\"11 topics\">malware<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>11<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hadoop\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/hadoop\/\"><span class=\"bar\" style=\"width:10.185185185185%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+hadoop\/\" class=\"term-link\" title=\"11 topics\">Hadoop<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>11<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"smart grids\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/smart-grids\/\"><span class=\"bar\" style=\"width:7.4074074074074%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+smart-grids\/\" class=\"term-link\" title=\"8 topics\">smart grids<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"encryption\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/encryption\/\"><span class=\"bar\" style=\"width:5.5555555555556%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+encryption\/\" class=\"term-link\" title=\"6 topics\">encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon Web Services (AWS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/amazon-web-services-aws\/\"><span class=\"bar\" style=\"width:5.5555555555556%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+amazon-web-services-aws\/\" class=\"term-link\" title=\"6 topics\">Amazon Web Services (AWS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"apache\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/apache\/\"><span class=\"bar\" style=\"width:5.5555555555556%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+apache\/\" class=\"term-link\" title=\"6 topics\">apache<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"information technology (IT)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/information-technology-it\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+information-technology-it\/\" class=\"term-link\" title=\"4 topics\">information technology (IT)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Databases\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/databases\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+databases\/\" class=\"term-link\" title=\"4 topics\">Databases<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"infrastructure as a service (IaaS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/infrastructure-as-a-service-iaas\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+infrastructure-as-a-service-iaas\/\" class=\"term-link\" title=\"4 topics\">infrastructure as a service (IaaS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"identity management\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/identity-management\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+identity-management\/\" class=\"term-link\" title=\"3 topics\">identity management<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"artificial intelligence\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/artificial-intelligence\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+artificial-intelligence\/\" class=\"term-link\" title=\"3 topics\">artificial intelligence<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data centers\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/data-centers\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+data-centers\/\" class=\"term-link\" title=\"3 topics\">data centers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"machine-learning\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/machine-learning\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+machine-learning\/\" class=\"term-link\" title=\"3 topics\">machine-learning<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"smart meters\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/smart-meters\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+smart-meters\/\" class=\"term-link\" title=\"3 topics\">smart meters<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"platform as a service (PaaS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/platform-as-a-service-paas\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+platform-as-a-service-paas\/\" class=\"term-link\" title=\"3 topics\">platform as a service (PaaS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"internet of things (IoT)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/internet-of-things-iot\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+internet-of-things-iot\/\" class=\"term-link\" title=\"3 topics\">internet of things (IoT)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"software as a service (SaaS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/software-as-a-service-saas\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+software-as-a-service-saas\/\" class=\"term-link\" title=\"3 topics\">software as a service (SaaS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"smartphones\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/smartphones\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+smartphones\/\" class=\"term-link\" title=\"3 topics\">smartphones<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Windows Azure\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/windows-azure\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+windows-azure\/\" class=\"term-link\" title=\"3 topics\">Windows Azure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"social media\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/social-media\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+social-media\/\" class=\"term-link\" title=\"3 topics\">social media<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"virtualization\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/virtualization\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+virtualization\/\" class=\"term-link\" title=\"2 topics\">virtualization<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile devices\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-devices\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+mobile-devices\/\" class=\"term-link\" title=\"2 topics\">mobile devices<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"small-cells\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/small-cells\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+small-cells\/\" class=\"term-link\" title=\"2 topics\">small-cells<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"security technologies\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/security-technologies\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+security-technologies\/\" class=\"term-link\" title=\"2 topics\">security technologies<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"wi-fi\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/wi-fi\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+wi-fi\/\" class=\"term-link\" title=\"2 topics\">wi-fi<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"NoSQL\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/nosql\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+nosql\/\" class=\"term-link\" title=\"2 topics\">NoSQL<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Android\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/android\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+android\/\" class=\"term-link\" title=\"2 topics\">Android<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"fraud detection\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/fraud-detection\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+fraud-detection\/\" class=\"term-link\" title=\"2 topics\">fraud detection<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"natural language processing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/natural-language-processing\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+natural-language-processing\/\" class=\"term-link\" title=\"2 topics\">natural language processing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"database management systems (DBMS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/database-management-systems-dbms\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+database-management-systems-dbms\/\" class=\"term-link\" title=\"2 topics\">database management systems (DBMS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Force.com\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/force-com\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+force-com\/\" class=\"term-link\" title=\"2 topics\">Force.com<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"internet\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/internet\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+internet\/\" class=\"term-link\" title=\"2 topics\">internet<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/computing\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+computing\/\" class=\"term-link\" title=\"2 topics\">computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"speech recognition\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/speech-recognition\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+speech-recognition\/\" class=\"term-link\" title=\"2 topics\">speech recognition<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Chatter\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/chatter\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+chatter\/\" class=\"term-link\" title=\"2 topics\">Chatter<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iPhone\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/iphone\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+iphone\/\" class=\"term-link\" title=\"2 topics\">iPhone<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cloud Storage\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-storage\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+cloud-storage\/\" class=\"term-link\" title=\"2 topics\">Cloud Storage<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"social networks\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/social-networks\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+social-networks\/\" class=\"term-link\" title=\"2 topics\">social networks<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"firewall\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/firewall\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+firewall\/\" class=\"term-link\" title=\"2 topics\">firewall<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mapreduce\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mapreduce\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+mapreduce\/\" class=\"term-link\" title=\"2 topics\">mapreduce<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Heartbleed\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/heartbleed\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+heartbleed\/\" class=\"term-link\" title=\"2 topics\">Heartbleed<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"connected devices\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/connected-devices\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+connected-devices\/\" class=\"term-link\" title=\"2 topics\">connected devices<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"DLP\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/dlp\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+dlp\/\" class=\"term-link\" title=\"1 topics\">DLP<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"private clouds\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/private-clouds\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+private-clouds\/\" class=\"term-link\" title=\"1 topics\">private clouds<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cryptography\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cryptography\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+cryptography\/\" class=\"term-link\" title=\"1 topics\">cryptography<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"relational database management system (RDBMS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/relational-database-management-system-rdbms\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+relational-database-management-system-rdbms\/\" class=\"term-link\" title=\"1 topics\">relational database management system (RDBMS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"tablets\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/tablets\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+tablets\/\" class=\"term-link\" title=\"1 topics\">tablets<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-6\" class=\"facet-companies facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Companies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Google\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/google\/\"><span class=\"bar\" style=\"width:16.666666666667%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=google\" class=\"term-link\" title=\"18 topics\">Google<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>18<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Facebook\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/facebook\/\"><span class=\"bar\" style=\"width:10.185185185185%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=facebook\" class=\"term-link\" title=\"11 topics\">Facebook<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>11<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/microsoft\/\"><span class=\"bar\" style=\"width:9.2592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=microsoft\" class=\"term-link\" title=\"10 topics\">Microsoft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>10<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/amazon\/\"><span class=\"bar\" style=\"width:8.3333333333333%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=amazon\" class=\"term-link\" title=\"9 topics\">Amazon<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"IBM\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ibm\/\"><span class=\"bar\" style=\"width:7.4074074074074%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=ibm\" class=\"term-link\" title=\"8 topics\">IBM<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Apple\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/apple\/\"><span class=\"bar\" style=\"width:5.5555555555556%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=apple\" class=\"term-link\" title=\"6 topics\">Apple<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"National Security Agency (NSA)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/national-security-agency-nsa\/\"><span class=\"bar\" style=\"width:5.5555555555556%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=national-security-agency-nsa\" class=\"term-link\" title=\"6 topics\">National Security Agency (NSA)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hewlett-Packard (HP)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/hewlett-packard-hp\/\"><span class=\"bar\" style=\"width:5.5555555555556%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=hewlett-packard-hp\" class=\"term-link\" title=\"6 topics\">Hewlett-Packard (HP)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Apache Software Foundation\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/apache-software-foundation\/\"><span class=\"bar\" style=\"width:5.5555555555556%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=apache-software-foundation\" class=\"term-link\" title=\"6 topics\">Apache Software Foundation<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FBI\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/fbi\/\"><span class=\"bar\" style=\"width:4.6296296296296%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=fbi\" class=\"term-link\" title=\"5 topics\">FBI<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sony\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sony\/\"><span class=\"bar\" style=\"width:4.6296296296296%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=sony\" class=\"term-link\" title=\"5 topics\">Sony<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Oracle\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/oracle\/\"><span class=\"bar\" style=\"width:4.6296296296296%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=oracle\" class=\"term-link\" title=\"5 topics\">Oracle<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CloudFlare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cloudflare\/\"><span class=\"bar\" style=\"width:4.6296296296296%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=cloudflare\" class=\"term-link\" title=\"5 topics\">CloudFlare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"U.S. federal government\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/u-s-federal-government\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=u-s-federal-government\" class=\"term-link\" title=\"4 topics\">U.S. federal government<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"VMWare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/vmware\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=vmware\" class=\"term-link\" title=\"4 topics\">VMWare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cisco Systems\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cisco-systems\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=cisco-systems\" class=\"term-link\" title=\"4 topics\">Cisco Systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Twitter\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/twitter\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=twitter\" class=\"term-link\" title=\"4 topics\">Twitter<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Yahoo\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/yahoo\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=yahoo\" class=\"term-link\" title=\"4 topics\">Yahoo<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FireEye\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/fireeye\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=fireeye\" class=\"term-link\" title=\"3 topics\">FireEye<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Red Hat\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/red-hat\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=red-hat\" class=\"term-link\" title=\"3 topics\">Red Hat<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"General Catalyst Partners\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/general-catalyst-partners\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=general-catalyst-partners\" class=\"term-link\" title=\"3 topics\">General Catalyst Partners<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Docker\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/docker\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=docker\" class=\"term-link\" title=\"3 topics\">Docker<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mandiant\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/mandiant\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=mandiant\" class=\"term-link\" title=\"3 topics\">Mandiant<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Anthem\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/anthem\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=anthem\" class=\"term-link\" title=\"3 topics\">Anthem<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Obama administration\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/obama-administration\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=obama-administration\" class=\"term-link\" title=\"3 topics\">Obama administration<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Salesforce\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/salesforce\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=salesforce\" class=\"term-link\" title=\"3 topics\">Salesforce<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Target\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/target\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=target\" class=\"term-link\" title=\"3 topics\">Target<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PayPal\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/paypal\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=paypal\" class=\"term-link\" title=\"3 topics\">PayPal<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"National Institute of Standards and Technology (NIST)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/national-institute-of-standards-and-technology-nist\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=national-institute-of-standards-and-technology-nist\" class=\"term-link\" title=\"2 topics\">National Institute of Standards and Technology (NIST)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Zeus Technology\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/zeus-technology\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=zeus-technology\" class=\"term-link\" title=\"2 topics\">Zeus Technology<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"ThreatStream\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/threatstream\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=threatstream\" class=\"term-link\" title=\"2 topics\">ThreatStream<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sourcefire\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sourcefire\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=sourcefire\" class=\"term-link\" title=\"2 topics\">Sourcefire<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"U.S. Department of Energy\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/u-s-department-of-energy\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=u-s-department-of-energy\" class=\"term-link\" title=\"2 topics\">U.S. Department of Energy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Imperva\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/imperva\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=imperva\" class=\"term-link\" title=\"2 topics\">Imperva<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Check Point\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/check-point\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=check-point\" class=\"term-link\" title=\"2 topics\">Check Point<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Skyhigh Networks\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/skyhigh-networks\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=skyhigh-networks\" class=\"term-link\" title=\"2 topics\">Skyhigh Networks<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"ebay\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ebay\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=ebay\" class=\"term-link\" title=\"2 topics\">ebay<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cloudera\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cloudera\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=cloudera\" class=\"term-link\" title=\"2 topics\">Cloudera<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Taleo\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/taleo\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=taleo\" class=\"term-link\" title=\"2 topics\">Taleo<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Akamai\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/akamai\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=akamai\" class=\"term-link\" title=\"2 topics\">Akamai<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"WellPoint\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/wellpoint\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=wellpoint\" class=\"term-link\" title=\"2 topics\">WellPoint<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"LinkedIn\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/linkedin\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=linkedin\" class=\"term-link\" title=\"2 topics\">LinkedIn<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"U.S. Department of Defense\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/u-s-department-of-defense\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=u-s-department-of-defense\" class=\"term-link\" title=\"2 topics\">U.S. Department of Defense<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"JPMorgan Chase\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/jpmorgan-chase\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=jpmorgan-chase\" class=\"term-link\" title=\"2 topics\">JPMorgan Chase<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"home depot\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/home-depot\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=home-depot\" class=\"term-link\" title=\"2 topics\">home depot<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"RightNow\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/rightnow\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=rightnow\" class=\"term-link\" title=\"2 topics\">RightNow<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Federal Energy Regulatory Commission (FERC)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/federal-energy-regulatory-commission-ferc\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=federal-energy-regulatory-commission-ferc\" class=\"term-link\" title=\"2 topics\">Federal Energy Regulatory Commission (FERC)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"DARPA\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/darpa\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=darpa\" class=\"term-link\" title=\"2 topics\">DARPA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sony Pictures Entertainment\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sony-pictures-entertainment\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=sony-pictures-entertainment\" class=\"term-link\" title=\"2 topics\">Sony Pictures Entertainment<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PassOmatic\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/passomatic\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?company=passomatic\" class=\"term-link\" title=\"1 topics\">PassOmatic<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-11\" class=\"facet-people facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">People<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Steve Herrod\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/steve-herrod\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=steve-herrod\" class=\"term-link\" title=\"2 topics\">Steve Herrod<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hui Wang\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/hui-wang\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=hui-wang\" class=\"term-link\" title=\"1 topics\">Hui Wang<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Katherine M Tassi\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/katherine-m-tassi\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=katherine-m-tassi\" class=\"term-link\" title=\"1 topics\">Katherine M Tassi<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Joshua Corman\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/joshua-corman\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=joshua-corman\" class=\"term-link\" title=\"1 topics\">Joshua Corman<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Chris Doggett\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/chris-doggett\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=chris-doggett\" class=\"term-link\" title=\"1 topics\">Chris Doggett<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Satya Nadella\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/satya-nadella\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=satya-nadella\" class=\"term-link\" title=\"1 topics\">Satya Nadella<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"JOsh Cormna\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/josh-cormna\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=josh-cormna\" class=\"term-link\" title=\"1 topics\">JOsh Cormna<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Brian Krebs\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/brian-krebs\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=brian-krebs\" class=\"term-link\" title=\"1 topics\">Brian Krebs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mathew Ingram\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/mathew-ingram\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=mathew-ingram\" class=\"term-link\" title=\"1 topics\">Mathew Ingram<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sanjay Virmani\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/sanjay-virmani\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=sanjay-virmani\" class=\"term-link\" title=\"1 topics\">Sanjay Virmani<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mark Hammell\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/mark-hammell\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=mark-hammell\" class=\"term-link\" title=\"1 topics\">Mark Hammell<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lisa Monaco\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/lisa-monaco\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=lisa-monaco\" class=\"term-link\" title=\"1 topics\">Lisa Monaco<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Joseph Swedish\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/joseph-swedish\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=joseph-swedish\" class=\"term-link\" title=\"1 topics\">Joseph Swedish<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hugo Fiennes\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/hugo-fiennes\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=hugo-fiennes\" class=\"term-link\" title=\"1 topics\">Hugo Fiennes<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Edward Snowden\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/edward-snowden\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=edward-snowden\" class=\"term-link\" title=\"1 topics\">Edward Snowden<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Steve Ballmer\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/steve-ballmer\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=steve-ballmer\" class=\"term-link\" title=\"1 topics\">Steve Ballmer<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Brian Stevens\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/brian-stevens\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=brian-stevens\" class=\"term-link\" title=\"1 topics\">Brian Stevens<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Barack Obama\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/barack-obama\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=barack-obama\" class=\"term-link\" title=\"1 topics\">Barack Obama<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mohan Koo\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/mohan-koo\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=mohan-koo\" class=\"term-link\" title=\"1 topics\">Mohan Koo<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Christopher Graham\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/christopher-graham\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?person=christopher-graham\" class=\"term-link\" title=\"1 topics\">Christopher Graham<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-2\" class=\"facet-tags facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Other<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/security\/\"><span class=\"bar\" style=\"width:24.074074074074%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=security\" class=\"term-link\" title=\"26 topics\">security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>26<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hacking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/hacking\/\"><span class=\"bar\" style=\"width:21.296296296296%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=hacking\" class=\"term-link\" title=\"23 topics\">hacking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>23<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"privacy\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/privacy\/\"><span class=\"bar\" style=\"width:7.4074074074074%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=privacy\" class=\"term-link\" title=\"8 topics\">privacy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cyberwarfare\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cyberwarfare\/\"><span class=\"bar\" style=\"width:6.4814814814815%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=cyberwarfare\" class=\"term-link\" title=\"7 topics\">Cyberwarfare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"enterprise IT\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/enterprise-it\/\"><span class=\"bar\" style=\"width:6.4814814814815%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=enterprise-it\" class=\"term-link\" title=\"7 topics\">enterprise IT<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data-security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-security\/\"><span class=\"bar\" style=\"width:5.5555555555556%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=data-security\" class=\"term-link\" title=\"6 topics\">data-security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CISPA\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cispa\/\"><span class=\"bar\" style=\"width:4.6296296296296%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=cispa\" class=\"term-link\" title=\"5 topics\">CISPA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Stop Online Piracy Act (SOPA)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/stop-online-piracy-act-sopa\/\"><span class=\"bar\" style=\"width:4.6296296296296%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=stop-online-piracy-act-sopa\" class=\"term-link\" title=\"5 topics\">Stop Online Piracy Act (SOPA)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BYOD\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/byod\/\"><span class=\"bar\" style=\"width:4.6296296296296%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=byod\" class=\"term-link\" title=\"5 topics\">BYOD<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud infrastructure\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-infrastructure\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=cloud-infrastructure\" class=\"term-link\" title=\"4 topics\">cloud infrastructure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"denial-of-service (DoS)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/denial-of-service-dos\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=denial-of-service-dos\" class=\"term-link\" title=\"4 topics\">denial-of-service (DoS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-security\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=cloud-security\" class=\"term-link\" title=\"4 topics\">cloud security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data science\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-science\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=data-science\" class=\"term-link\" title=\"4 topics\">data science<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"regulations\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/regulations\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=regulations\" class=\"term-link\" title=\"3 topics\">regulations<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CIOs\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cios\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=cios\" class=\"term-link\" title=\"3 topics\">CIOs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"healthcare\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/healthcare\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=healthcare\" class=\"term-link\" title=\"3 topics\">healthcare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"governments\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/governments\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=governments\" class=\"term-link\" title=\"3 topics\">governments<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Structure:Data\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/structuredata\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=structuredata\" class=\"term-link\" title=\"3 topics\">Structure:Data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"smart grids\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/smart-grids\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=smart-grids\" class=\"term-link\" title=\"3 topics\">smart grids<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data breach\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-breach\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=data-breach\" class=\"term-link\" title=\"3 topics\">data breach<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"China\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/china\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=china\" class=\"term-link\" title=\"3 topics\">China<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"JPMorgan Chase\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/jpmorgan-chase\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=jpmorgan-chase\" class=\"term-link\" title=\"3 topics\">JPMorgan Chase<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"intelligence\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/intelligence\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=intelligence\" class=\"term-link\" title=\"3 topics\">intelligence<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Accumulo\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/accumulo\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=accumulo\" class=\"term-link\" title=\"3 topics\">Accumulo<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"containers\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/containers\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=containers\" class=\"term-link\" title=\"2 topics\">containers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"RSA\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/rsa\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=rsa\" class=\"term-link\" title=\"2 topics\">RSA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"SIEM\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/siem\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=siem\" class=\"term-link\" title=\"2 topics\">SIEM<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"fraud detection\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/fraud-detection\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=fraud-detection\" class=\"term-link\" title=\"2 topics\">fraud detection<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"sqrrl\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/sqrrl\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=sqrrl\" class=\"term-link\" title=\"2 topics\">sqrrl<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Easy Solutions\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/easy-solutions\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=easy-solutions\" class=\"term-link\" title=\"2 topics\">Easy Solutions<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"breach\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/breach\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=breach\" class=\"term-link\" title=\"2 topics\">breach<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"web security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/web-security\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=web-security\" class=\"term-link\" title=\"2 topics\">web security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mandiant\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mandiant\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=mandiant\" class=\"term-link\" title=\"2 topics\">Mandiant<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"black hat\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/black-hat\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=black-hat\" class=\"term-link\" title=\"2 topics\">black hat<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data management\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-management\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=data-management\" class=\"term-link\" title=\"2 topics\">data management<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"software defined networking (SDN)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/software-defined-networking-sdn\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=software-defined-networking-sdn\" class=\"term-link\" title=\"2 topics\">software defined networking (SDN)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Enterprise Mobility\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/enterprise-mobility\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=enterprise-mobility\" class=\"term-link\" title=\"2 topics\">Enterprise Mobility<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Spam filtering\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/spam-filtering\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=spam-filtering\" class=\"term-link\" title=\"2 topics\">Spam filtering<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hacktivism\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/hacktivism\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=hacktivism\" class=\"term-link\" title=\"2 topics\">hacktivism<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cyber Intelligence Sharing and Protection Act\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cyber-intelligence-sharing-and-protection-act\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=cyber-intelligence-sharing-and-protection-act\" class=\"term-link\" title=\"2 topics\">Cyber Intelligence Sharing and Protection Act<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"censorship\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/censorship\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=censorship\" class=\"term-link\" title=\"2 topics\">censorship<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"surveillance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/surveillance\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=surveillance\" class=\"term-link\" title=\"2 topics\">surveillance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"fraud\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/fraud\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=fraud\" class=\"term-link\" title=\"2 topics\">fraud<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"open source\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/open-source\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=open-source\" class=\"term-link\" title=\"2 topics\">open source<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"phishing\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/phishing\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=phishing\" class=\"term-link\" title=\"2 topics\">phishing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"passwords\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/passwords\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=passwords\" class=\"term-link\" title=\"2 topics\">passwords<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"legal issues\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/legal-issues\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=legal-issues\" class=\"term-link\" title=\"2 topics\">legal issues<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Stuxnet\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/stuxnet\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=stuxnet\" class=\"term-link\" title=\"2 topics\">Stuxnet<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Anti-spam techniques\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/anti-spam-techniques\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=anti-spam-techniques\" class=\"term-link\" title=\"2 topics\">Anti-spam techniques<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Anthem\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/anthem\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?tag=anthem\" class=\"term-link\" title=\"2 topics\">Anthem<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-8\" class=\"facet-author widget widget_scriblio_facets\"><header class=\"widget-title\">Author<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Derrick Harris\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/dharrisstructure\/\"><span class=\"bar\" style=\"width:20.37037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=dharrisstructure\" class=\"term-link\" title=\"22 topics\">Derrick Harris<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>22<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Barb Darrow\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/barbdarrow\/\"><span class=\"bar\" style=\"width:12.962962962963%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"14 topics\">Barb Darrow<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>14<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"David Meyer\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/superglaze\/\"><span class=\"bar\" style=\"width:8.3333333333333%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=superglaze\" class=\"term-link\" title=\"9 topics\">David Meyer<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jordan Novet\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/gigajordan\/\"><span class=\"bar\" style=\"width:6.4814814814815%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=gigajordan\" class=\"term-link\" title=\"7 topics\">Jordan Novet<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jonathan Vanian\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jonathanvanian\/\"><span class=\"bar\" style=\"width:5.5555555555556%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-jonathanvanian\" class=\"term-link\" title=\"6 topics\">Jonathan Vanian<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ucilia Wang\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/ucilia-wang\/\"><span class=\"bar\" style=\"width:4.6296296296296%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-ucilia-wang\" class=\"term-link\" title=\"5 topics\">Ucilia Wang<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Guest Column\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/gigaguest\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=gigaguest\" class=\"term-link\" title=\"4 topics\">Guest Column<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jeff St. John\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jeffstjohn\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-jeffstjohn\" class=\"term-link\" title=\"4 topics\">Jeff St. John<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Laura Stuart\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/laurastuart\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-laurastuart\" class=\"term-link\" title=\"4 topics\">Laura Stuart<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jeff Roberts\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jeffr\/\"><span class=\"bar\" style=\"width:3.7037037037037%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-jeffr\" class=\"term-link\" title=\"4 topics\">Jeff Roberts<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Keren Elazari\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kerenelazari\/\"><span class=\"bar\" style=\"width:2.7777777777778%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-kerenelazari\" class=\"term-link\" title=\"3 topics\">Keren Elazari<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Steve Hunt\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/stevehunt\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-stevehunt\" class=\"term-link\" title=\"2 topics\">Steve Hunt<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ki Mae Heussner\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kimaeheussner\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=kimaeheussner\" class=\"term-link\" title=\"2 topics\">Ki Mae Heussner<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Matt Sarrel\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/mattsarrel\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=mattsarrel\" class=\"term-link\" title=\"2 topics\">Matt Sarrel<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Salvatore D&#039;Agostino\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/sala\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=sala\" class=\"term-link\" title=\"2 topics\">Salvatore D&#039;Agostino<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"April Kilcrease\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/aprilkilcrease\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-aprilkilcrease\" class=\"term-link\" title=\"2 topics\">April Kilcrease<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Stacey Higginbotham\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/staceyh\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-staceyh\" class=\"term-link\" title=\"2 topics\">Stacey Higginbotham<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Michael Finneran\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/michaelfinneran\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-michaelfinneran\" class=\"term-link\" title=\"1 topics\">Michael Finneran<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"David S. Linthicum\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/david57\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=david57\" class=\"term-link\" title=\"1 topics\">David S. Linthicum<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amanda Alvarez\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/neuroamanda\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-neuroamanda\" class=\"term-link\" title=\"1 topics\">Amanda Alvarez<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"John Webster\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/john3\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=john3\" class=\"term-link\" title=\"1 topics\">John Webster<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mike Kavis\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/mikekavis\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=mikekavis\" class=\"term-link\" title=\"1 topics\">Mike Kavis<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Rob Defrancesco\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/techstockradar\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-techstockradar\" class=\"term-link\" title=\"1 topics\">Rob Defrancesco<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ben Kepes\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/benkepes\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=benkepes\" class=\"term-link\" title=\"1 topics\">Ben Kepes<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lauren Hockenson\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/laurenhockenson1\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-laurenhockenson1\" class=\"term-link\" title=\"1 topics\">Lauren Hockenson<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kif Leswing\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kifleswing1\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-kifleswing1\" class=\"term-link\" title=\"1 topics\">Kif Leswing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Tom Krazit\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/tomk1\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-tomk1\" class=\"term-link\" title=\"1 topics\">Tom Krazit<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lawrence M. Walsh (Larry Walsh)\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/larrywalsh\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-larrywalsh\" class=\"term-link\" title=\"1 topics\">Lawrence M. Walsh (Larry Walsh)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"justin\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/justin\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-justin\" class=\"term-link\" title=\"1 topics\">justin<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Paul Miller\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/paulmiller1\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=paulmiller1\" class=\"term-link\" title=\"1 topics\">Paul Miller<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Janakiram MSV\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/janakiram\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-janakiram\" class=\"term-link\" title=\"1 topics\">Janakiram MSV<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jo Maitland\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jomaitland\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=jomaitland\" class=\"term-link\" title=\"1 topics\">Jo Maitland<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Craig Foster\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/craigfoster\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=craigfoster\" class=\"term-link\" title=\"1 topics\">Craig Foster<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jackson West\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jacksonwest\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-jacksonwest\" class=\"term-link\" title=\"1 topics\">Jackson West<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mathew Ingram\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/mathewi1\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-mathewi1\" class=\"term-link\" title=\"1 topics\">Mathew Ingram<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-3\" class=\"facet-post-type widget widget_scriblio_facets\"><header class=\"widget-title\">Content Type<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/news-post\/\"><span class=\"bar\" style=\"width:71.296296296296%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/news-post\/?technology=cybersecurity\" class=\"term-link\" title=\"77 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>77<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Report\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/report\/\"><span class=\"bar\" style=\"width:14.814814814815%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/report\/?technology=cybersecurity\" class=\"term-link\" title=\"16 topics\">Report<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>16<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/blog-post\/\"><span class=\"bar\" style=\"width:5.5555555555556%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/blog-post\/?technology=cybersecurity\" class=\"term-link\" title=\"6 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Webinar\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/webinar\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/webinar\/?technology=cybersecurity\" class=\"term-link\" title=\"2 topics\">Webinar<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"audio\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/audio\/\"><span class=\"bar\" style=\"width:1.8518518518519%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/audio\/?technology=cybersecurity\" class=\"term-link\" title=\"2 topics\">audio<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Quarterly Wrap-Up\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/quarterly-wrap-up\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/quarterly-wrap-up\/?technology=cybersecurity\" class=\"term-link\" title=\"1 topics\">Quarterly Wrap-Up<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-5\" class=\"facet-property widget widget_scriblio_facets\"><header class=\"widget-title\">Property<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Gigaom\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/gigaom\/\"><span class=\"bar\" style=\"width:72.222222222222%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/gigaom\/?technology=cybersecurity\" class=\"term-link\" title=\"78 topics\">Gigaom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>78<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Research\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/research\/\"><span class=\"bar\" style=\"width:23.148148148148%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/research\/?technology=cybersecurity\" class=\"term-link\" title=\"25 topics\">Research<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>25<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"paidContent\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/paidcontent\/\"><span class=\"bar\" style=\"width:0.92592592592593%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/paidcontent\/?technology=cybersecurity\" class=\"term-link\" title=\"1 topics\">paidContent<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-10\" class=\"facet-availability widget widget_scriblio_facets\"><header class=\"widget-title\">Access<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Free\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/free\/\"><span class=\"bar\" style=\"width:85.185185185185%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/availability\/free\/?technology=cybersecurity\" class=\"term-link\" title=\"92 topics\">Free<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>92<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Subscription\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/subscription\/\"><span class=\"bar\" style=\"width:14.814814814815%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/availability\/subscription\/?technology=cybersecurity\" class=\"term-link\" title=\"16 topics\">Subscription<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>16<\/span><\/a><\/li>\n<\/ul>\n<\/div>";