var varname = "wijax_6abe67f36ade9e095aacb572fde7bcf9"; window[varname]="<span id=\"widget-go-widget-areas-2\" data-remove-on-inject-classes=\" \" class=\"  search-facets go-custom-widget-area_search-facets wijax-widgetclasses widget-go-widget-areas widget-area go-widget-areas-2 \"><\/span>\n<div id=\"scriblio_facets-7\" class=\"facet-technologies-and-products facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Technologies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"cybersecurity\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/author\/dharrisstructure\/\" class=\"term-link\" title=\"22 topics\">cybersecurity<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>22<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"big data\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/big-data\/\"><span class=\"bar\" style=\"width:59.090909090909%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+big-data\/?authors=dharrisstructure\" class=\"term-link\" title=\"13 topics\">big data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>13<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hadoop\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/hadoop\/\"><span class=\"bar\" style=\"width:31.818181818182%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+hadoop\/?authors=dharrisstructure\" class=\"term-link\" title=\"7 topics\">Hadoop<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"apache\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/apache\/\"><span class=\"bar\" style=\"width:27.272727272727%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+apache\/?authors=dharrisstructure\" class=\"term-link\" title=\"6 topics\">apache<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"machine-learning\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/machine-learning\/\"><span class=\"bar\" style=\"width:13.636363636364%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+machine-learning\/?authors=dharrisstructure\" class=\"term-link\" title=\"3 topics\">machine-learning<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Databases\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/databases\/\"><span class=\"bar\" style=\"width:13.636363636364%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+databases\/?authors=dharrisstructure\" class=\"term-link\" title=\"3 topics\">Databases<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"malware\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/malware\/\"><span class=\"bar\" style=\"width:13.636363636364%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+malware\/?authors=dharrisstructure\" class=\"term-link\" title=\"3 topics\">malware<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-computing\/\"><span class=\"bar\" style=\"width:13.636363636364%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+cloud-computing\/?authors=dharrisstructure\" class=\"term-link\" title=\"3 topics\">cloud computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"NoSQL\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/nosql\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+nosql\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">NoSQL<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"artificial intelligence\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/artificial-intelligence\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+artificial-intelligence\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">artificial intelligence<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"social media\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/social-media\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+social-media\/?authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">social media<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"wi-fi\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/wi-fi\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+wi-fi\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">wi-fi<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"deep learning\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/deep-learning\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+deep-learning\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">deep learning<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cloud Storage\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-storage\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+cloud-storage\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Cloud Storage<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bluetooth\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/bluetooth\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+bluetooth\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Bluetooth<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"encryption\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/encryption\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+encryption\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"algorithms\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/algorithms\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+algorithms\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">algorithms<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"natural language processing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/natural-language-processing\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+natural-language-processing\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">natural language processing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data centers\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/data-centers\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+data-centers\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">data centers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"small-cells\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/small-cells\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+small-cells\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">small-cells<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"patents\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/patents\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+patents\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">patents<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"analytics\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/analytics\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity+analytics\/?authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">analytics<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-6\" class=\"facet-companies facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Companies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Apache Software Foundation\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/apache-software-foundation\/\"><span class=\"bar\" style=\"width:18.181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/apache-software-foundation\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"4 topics\">Apache Software Foundation<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CloudFlare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cloudflare\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/cloudflare\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">CloudFlare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"National Security Agency (NSA)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/national-security-agency-nsa\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/national-security-agency-nsa\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">National Security Agency (NSA)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Google\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/google\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/google\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">Google<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Facebook\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/facebook\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/facebook\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">Facebook<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Arygle Data\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/arygle-data\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/arygle-data\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Arygle Data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/microsoft\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/microsoft\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Microsoft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"EMC\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/emc\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/emc\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">EMC<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"WibiData\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/wibidata\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/wibidata\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">WibiData<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sourcefire\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sourcefire\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/sourcefire\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Sourcefire<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"GoGrid\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/gogrid\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/gogrid\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">GoGrid<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"DataStax\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/datastax\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/datastax\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">DataStax<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"GoDaddy\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/godaddy\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/godaddy\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">GoDaddy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Docker\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/docker\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/docker\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Docker<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"DARPA\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/darpa\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/darpa\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">DARPA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FBI\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/fbi\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/fbi\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">FBI<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"VMWare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/vmware\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/vmware\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">VMWare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"General Catalyst Partners\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/general-catalyst-partners\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/general-catalyst-partners\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">General Catalyst Partners<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"unisys\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/unisys\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/unisys\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">unisys<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cybereason\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cybereason\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/cybereason\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Cybereason<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"U.S. federal government\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/u-s-federal-government\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/u-s-federal-government\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">U.S. federal government<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PayPal\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/paypal\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/paypal\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">PayPal<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"SQLStream\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sqlstream\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/sqlstream\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">SQLStream<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Alpine Data Labs\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/alpine-data-labs\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/alpine-data-labs\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Alpine Data Labs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"zettaset\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/zettaset\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/zettaset\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">zettaset<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-11\" class=\"facet-people facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">People<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Hui Wang\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/hui-wang\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/hui-wang\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Hui Wang<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Steve Herrod\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/steve-herrod\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/steve-herrod\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Steve Herrod<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-2\" class=\"facet-tags facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Other<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/security\/\"><span class=\"bar\" style=\"width:45.454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"10 topics\">security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>10<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hacking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/hacking\/\"><span class=\"bar\" style=\"width:22.727272727273%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"5 topics\">hacking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data science\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-science\/\"><span class=\"bar\" style=\"width:18.181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/data-science\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"4 topics\">data science<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"privacy\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/privacy\/\"><span class=\"bar\" style=\"width:18.181818181818%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/privacy\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"4 topics\">privacy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Structure:Data\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/structuredata\/\"><span class=\"bar\" style=\"width:13.636363636364%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/structuredata\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"3 topics\">Structure:Data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Accumulo\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/accumulo\/\"><span class=\"bar\" style=\"width:13.636363636364%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/accumulo\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"3 topics\">Accumulo<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"intelligence\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/intelligence\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/intelligence\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">intelligence<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"black hat\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/black-hat\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/black-hat\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">black hat<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"legal issues\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/legal-issues\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/legal-issues\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">legal issues<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"sqrrl\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/sqrrl\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/sqrrl\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">sqrrl<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"web security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/web-security\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/web-security\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">web security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-security\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/cloud-security\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">cloud security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"denial-of-service (DoS)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/denial-of-service-dos\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/denial-of-service-dos\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">denial-of-service (DoS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hacktivism\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/hacktivism\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacktivism\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">hacktivism<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"open source\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/open-source\/\"><span class=\"bar\" style=\"width:9.0909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/open-source\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"2 topics\">open source<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"online payment platform\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/online-payment-platform\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/online-payment-platform\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">online payment platform<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Tenable Network Security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/tenable-network-security\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/tenable-network-security\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Tenable Network Security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Silver Tail Systems\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/silver-tail-systems\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/silver-tail-systems\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Silver Tail Systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"network security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/network-security\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/network-security\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">network security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bromium\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/bromium\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/bromium\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Bromium<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"machine-learning\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/machine-learning-2\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/machine-learning-2\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">machine-learning<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"spying\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/spying\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/spying\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">spying<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"spam\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/spam\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/spam\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">spam<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Stop Online Piracy Act (SOPA)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/stop-online-piracy-act-sopa\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/stop-online-piracy-act-sopa\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Stop Online Piracy Act (SOPA)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"fraud\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/fraud\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/fraud\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">fraud<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BYOD\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/byod\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/byod\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">BYOD<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kevin Mitnick\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/kevin-mitnick\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/kevin-mitnick\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Kevin Mitnick<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"outages\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/outages\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/outages\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">outages<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"censorship\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/censorship\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/censorship\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">censorship<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PacketLoop\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/packetloop\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/packetloop\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">PacketLoop<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data breaches\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-breaches\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/data-breaches\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">data breaches<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Presto\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/presto\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/presto\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Presto<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Argyle Data\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/argyle-data\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/argyle-data\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Argyle Data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"national security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/national-security\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/national-security\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">national security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Research\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/research\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/research\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Research<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FireHost\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/firehost\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/firehost\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">FireHost<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"lulzsec\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/lulzsec\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/lulzsec\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">lulzsec<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"stream processing\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/stream-processing\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/stream-processing\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">stream processing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"security breaches\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/security-breaches\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/security-breaches\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">security breaches<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Palantir\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/palantir\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/palantir\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Palantir<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Terrorism\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/terrorism\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/terrorism\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Terrorism<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"containers\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/containers\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/containers\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">containers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"fraud detection\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/fraud-detection\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/fraud-detection\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">fraud detection<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Pattern recognition\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/pattern-recognition\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/pattern-recognition\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Pattern recognition<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Human trafficking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/human-trafficking\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/human-trafficking\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Human trafficking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Internet fraud\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/internet-fraud\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/internet-fraud\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">Internet fraud<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"public health\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/public-health\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/public-health\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">public health<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"law\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/law\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/law\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">law<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"copyright\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/copyright\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/copyright\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">copyright<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"consumer cloud\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/consumer-cloud\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/consumer-cloud\/?technology=cybersecurity&#038;authors=dharrisstructure\" class=\"term-link\" title=\"1 topics\">consumer cloud<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-8\" class=\"facet-author widget widget_scriblio_facets\"><header class=\"widget-title\">Author<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"Derrick Harris\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/dharrisstructure\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/\" class=\"term-link\" title=\"22 topics\">Derrick Harris<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>22<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-3\" class=\"facet-post-type widget widget_scriblio_facets\"><header class=\"widget-title\">Content Type<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/news-post\/\"><span class=\"bar\" style=\"width:81.818181818182%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=dharrisstructure&#038;go-type=news-post\" class=\"term-link\" title=\"18 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>18<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/blog-post\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=dharrisstructure&#038;go-type=blog-post\" class=\"term-link\" title=\"1 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"audio\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/audio\/\"><span class=\"bar\" style=\"width:4.5454545454545%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=dharrisstructure&#038;go-type=audio\" class=\"term-link\" title=\"1 topics\">audio<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-5\" class=\"facet-property widget widget_scriblio_facets\"><header class=\"widget-title\">Property<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Gigaom\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/gigaom\/\"><span class=\"bar\" style=\"width:90.909090909091%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=dharrisstructure&#038;go-property=gigaom\" class=\"term-link\" title=\"20 topics\">Gigaom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>20<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-10\" class=\"facet-availability widget widget_scriblio_facets\"><header class=\"widget-title\">Access<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Free\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/free\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/?authors=dharrisstructure&#038;go-availability=free\" class=\"term-link\" title=\"22 topics\">Free<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>22<\/span><\/a><\/li>\n<\/ul>\n<\/div>";
