var varname = "wijax_8bdd75e5256b8bfbd0048b80e01cdcce"; window[varname]="<span id=\"widget-go-widget-areas-2\" data-remove-on-inject-classes=\" \" class=\"  search-facets go-custom-widget-area_search-facets wijax-widgetclasses widget-go-widget-areas widget-area go-widget-areas-2 \"><\/span>\n<div id=\"scriblio_facets-7\" class=\"facet-technologies-and-products facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Technologies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"cybersecurity\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/author\/barbdarrow\/\" class=\"term-link\" title=\"14 topics\">cybersecurity<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>14<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data theft\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/data-theft\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+data-theft\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">data theft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Gameover Zeus\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/gameover-zeus\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+gameover-zeus\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Gameover Zeus<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"spearphishing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/spearphishing\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+spearphishing\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">spearphishing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cyberforensics\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cyberforensics\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+cyberforensics\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">cyberforensics<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"encryption\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/encryption\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+encryption\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"fraud detection\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/fraud-detection\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+fraud-detection\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">fraud detection<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"MacBook Air\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/macbook-air\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+macbook-air\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">MacBook Air<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"HIPAA\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/hipaa\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+hipaa\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">HIPAA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"malware\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/malware\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+malware\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">malware<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data security breach\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/data-security-breach\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+data-security-breach\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">data security breach<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"smartphones\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/smartphones\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+smartphones\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">smartphones<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"microsoft-azure\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/microsoft-azure\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+microsoft-azure\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">microsoft-azure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"intrusion protection\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/intrusion-protection\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+intrusion-protection\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">intrusion protection<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"endpoint protection\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/endpoint-protection\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+endpoint-protection\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">endpoint protection<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cyber forensics\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cyber-forensics\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+cyber-forensics\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">cyber forensics<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon Web Services (AWS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/amazon-web-services-aws\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+amazon-web-services-aws\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Amazon Web Services (AWS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-computing\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+cloud-computing\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">cloud computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"phishing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/phishing\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+phishing\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">phishing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Google Cloud Platform\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/google-cloud-platform\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+google-cloud-platform\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Google Cloud Platform<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Windows Azure\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/windows-azure\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+windows-azure\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Windows Azure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"internet\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/internet\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+internet\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">internet<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-6\" class=\"facet-companies facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Companies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Sony\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sony\/\"><span class=\"bar\" style=\"width:21.428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/sony\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"3 topics\">Sony<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mandiant\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/mandiant\/\"><span class=\"bar\" style=\"width:21.428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/mandiant\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"3 topics\">Mandiant<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Target\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/target\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/target\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Target<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"JPMorgan Chase\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/jpmorgan-chase\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/jpmorgan-chase\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">JPMorgan Chase<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hewlett-Packard (HP)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/hewlett-packard-hp\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/hewlett-packard-hp\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Hewlett-Packard (HP)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"IBM\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ibm\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/ibm\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">IBM<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"home depot\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/home-depot\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/home-depot\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">home depot<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CloudFlare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cloudflare\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/cloudflare\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">CloudFlare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Akamai\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/akamai\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/akamai\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Akamai<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FBI\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/fbi\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/fbi\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">FBI<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Anthem\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/anthem\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/anthem\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Anthem<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FireEye\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/fireeye\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/fireeye\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">FireEye<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Varonis\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/varonis\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/varonis\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Varonis<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Apple\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/apple\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/apple\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Apple<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Prolexic\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/prolexic\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/prolexic\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Prolexic<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Secret Service\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/secret-service\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/secret-service\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Secret Service<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kaspersky Lab\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/kaspersky-lab\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/kaspersky-lab\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Kaspersky Lab<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dyn\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/dyn\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/dyn\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Dyn<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Interpol\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/interpol\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/interpol\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Interpol<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Gartner\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/gartner\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/gartner\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Gartner<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"The New York Times\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/the-new-york-times\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/the-new-york-times\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">The New York Times<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"WellPoint\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/wellpoint\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/wellpoint\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">WellPoint<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"NBC News\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/nbc-news\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/nbc-news\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">NBC News<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"DARPA\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/darpa\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/darpa\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">DARPA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Google\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/google\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/google\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Google<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"In-Q-Tel\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/in-q-tel\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/in-q-tel\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">In-Q-Tel<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Voltage Security\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/voltage-security\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/voltage-security\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Voltage Security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/amazon\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/amazon\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Amazon<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Co3 Systems\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/co3-systems\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/co3-systems\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Co3 Systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Zeus Technology\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/zeus-technology\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/zeus-technology\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Zeus Technology<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Europol\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/europol\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/europol\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Europol<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/microsoft\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/microsoft\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Microsoft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cyber Threat Intelligence Integration Center\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cyber-threat-intelligence-integration-center\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/cyber-threat-intelligence-integration-center\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Cyber Threat Intelligence Integration Center<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"General Catalyst Partners\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/general-catalyst-partners\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/general-catalyst-partners\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">General Catalyst Partners<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"VMWare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/vmware\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/vmware\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">VMWare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dell\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/dell\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/dell\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Dell<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Obama administration\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/obama-administration\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/obama-administration\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Obama administration<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"UK Information Commission\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/uk-information-commission\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/uk-information-commission\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">UK Information Commission<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"NuData\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/nudata\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/nudata\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">NuData<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Incident Respose Management Systems\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/incident-respose-management-systems\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/incident-respose-management-systems\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Incident Respose Management Systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"U.S. Department of Defense\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/u-s-department-of-defense\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/u-s-department-of-defense\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">U.S. Department of Defense<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Zscalar\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/zscalar\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/zscalar\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Zscalar<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Chinese Foreign Ministry\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/chinese-foreign-ministry\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/chinese-foreign-ministry\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Chinese Foreign Ministry<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"National Consumers League\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/national-consumers-league\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/national-consumers-league\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">National Consumers League<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Oracle\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/oracle\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/oracle\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Oracle<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-11\" class=\"facet-people facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">People<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Satya Nadella\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/satya-nadella\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/satya-nadella\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Satya Nadella<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Chris Doggett\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/chris-doggett\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/chris-doggett\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Chris Doggett<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sanjay Virmani\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/sanjay-virmani\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/sanjay-virmani\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Sanjay Virmani<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Brian Krebs\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/brian-krebs\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/brian-krebs\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Brian Krebs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Brian Stevens\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/brian-stevens\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/brian-stevens\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Brian Stevens<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Christopher Graham\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/christopher-graham\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/christopher-graham\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Christopher Graham<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Joseph Swedish\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/joseph-swedish\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/joseph-swedish\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Joseph Swedish<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lisa Monaco\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/lisa-monaco\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/lisa-monaco\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Lisa Monaco<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Steve Ballmer\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/steve-ballmer\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/steve-ballmer\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Steve Ballmer<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-2\" class=\"facet-tags facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Other<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"JPMorgan Chase\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/jpmorgan-chase\/\"><span class=\"bar\" style=\"width:21.428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/jpmorgan-chase\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"3 topics\">JPMorgan Chase<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hacking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/hacking\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">hacking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data-security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-security\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/data-security\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">data-security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"privacy\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/privacy\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/privacy\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">privacy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mandiant\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mandiant\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/mandiant\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Mandiant<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"RSA\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/rsa\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/rsa\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">RSA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Anthem\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/anthem\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/anthem\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Anthem<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"breach\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/breach\/\"><span class=\"bar\" style=\"width:14.285714285714%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/breach\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">breach<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Prolexic\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/prolexic\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/prolexic\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Prolexic<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Olympic Games\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/olympic-games\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/olympic-games\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Olympic Games<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Interpol\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/interpol\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/interpol\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Interpol<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Secret Service\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/secret-service\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/secret-service\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Secret Service<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"anonymous\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/anonymous\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/anonymous\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">anonymous<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"kim jong un\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/kim-jong-un\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/kim-jong-un\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">kim jong un<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dan Geer\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/dan-geer\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/dan-geer\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Dan Geer<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dave DeWalt\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/dave-dewalt\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/dave-dewalt\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Dave DeWalt<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kevin Mandian\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/kevin-mandian\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/kevin-mandian\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Kevin Mandian<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cyber Threat Intelligence Integration Center\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cyber-threat-intelligence-integration-center\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/cyber-threat-intelligence-integration-center\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Cyber Threat Intelligence Integration Center<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"UK Information Commissioner\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/uk-information-commissioner\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/uk-information-commissioner\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">UK Information Commissioner<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"North Korea\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/north-korea\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/north-korea\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">North Korea<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Art Coviello\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/art-coviello\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/art-coviello\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Art Coviello<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Structure\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/structure\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/structure\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Structure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"phishing\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/phishing\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/phishing\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">phishing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kaspersky Lab\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/kaspersky-lab\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/kaspersky-lab\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Kaspersky Lab<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"healthcare\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/healthcare\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/healthcare\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">healthcare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"WellPoint\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/wellpoint\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/wellpoint\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">WellPoint<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"China\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/china\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/china\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">China<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"medical identity theft\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/medical-identity-theft\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/medical-identity-theft\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">medical identity theft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dyn\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/dyn\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/dyn\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Dyn<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"identity theft\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/identity-theft\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/identity-theft\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">identity theft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sochi\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/sochi\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/sochi\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Sochi<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cyber forensics\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cyber-forensics\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/cyber-forensics\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">cyber forensics<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Chris Doggett\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/chris-doggett\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/chris-doggett\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Chris Doggett<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"passwords\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/passwords\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/passwords\/?technology=cybersecurity&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">passwords<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-8\" class=\"facet-author widget widget_scriblio_facets\"><header class=\"widget-title\">Author<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"Barb Darrow\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/barbdarrow\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/\" class=\"term-link\" title=\"14 topics\">Barb Darrow<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>14<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-3\" class=\"facet-post-type widget widget_scriblio_facets\"><header class=\"widget-title\">Content Type<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/news-post\/\"><span class=\"bar\" style=\"width:78.571428571429%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-barbdarrow&#038;go-type=news-post\" class=\"term-link\" title=\"11 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>11<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"audio\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/audio\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-barbdarrow&#038;go-type=audio\" class=\"term-link\" title=\"1 topics\">audio<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/blog-post\/\"><span class=\"bar\" style=\"width:7.1428571428571%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-barbdarrow&#038;go-type=blog-post\" class=\"term-link\" title=\"1 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-5\" class=\"facet-property widget widget_scriblio_facets\"><header class=\"widget-title\">Property<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Gigaom\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/gigaom\/\"><span class=\"bar\" style=\"width:92.857142857143%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-barbdarrow&#038;go-property=gigaom\" class=\"term-link\" title=\"13 topics\">Gigaom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>13<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-10\" class=\"facet-availability widget widget_scriblio_facets\"><header class=\"widget-title\">Access<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Free\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/free\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=cap-barbdarrow&#038;go-availability=free\" class=\"term-link\" title=\"14 topics\">Free<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>14<\/span><\/a><\/li>\n<\/ul>\n<\/div>";
