var varname = "wijax_2c2e6d6c1075b67899094fd8dbbf0b81"; window[varname]="<span id=\"widget-go-widget-areas-2\" data-remove-on-inject-classes=\" \" class=\"  search-facets go-custom-widget-area_search-facets wijax-widgetclasses widget-go-widget-areas widget-area go-widget-areas-2 \"><\/span>\n<div id=\"scriblio_facets-7\" class=\"facet-technologies-and-products facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Technologies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"encryption\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/encryption\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/author\/barbdarrow\/\" class=\"term-link\" title=\"17 topics\">encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>17<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"openssl\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/openssl\/\"><span class=\"bar\" style=\"width:23.529411764706%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+openssl\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"4 topics\">openssl<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Heartbleed\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/heartbleed\/\"><span class=\"bar\" style=\"width:23.529411764706%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+heartbleed\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"4 topics\">Heartbleed<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"SSL\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/ssl\/\"><span class=\"bar\" style=\"width:23.529411764706%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+ssl\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"4 topics\">SSL<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon Web Services (AWS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/amazon-web-services-aws\/\"><span class=\"bar\" style=\"width:23.529411764706%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+amazon-web-services-aws\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"4 topics\">Amazon Web Services (AWS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-computing\/\"><span class=\"bar\" style=\"width:17.647058823529%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+cloud-computing\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"3 topics\">cloud computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft OneDrive\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/microsoft-onedrive\/\"><span class=\"bar\" style=\"width:11.764705882353%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+microsoft-onedrive\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Microsoft OneDrive<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cybersecurity\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+cybersecurity\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">cybersecurity<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data-security\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/data-security\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+data-security\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">data-security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ubuntu\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/ubuntu\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+ubuntu\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Ubuntu<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Azure Key Vault\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/azure-key-vault\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+azure-key-vault\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Azure Key Vault<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Gmail\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/gmail\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+gmail\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Gmail<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Aurora\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/aurora\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+aurora\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Aurora<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hardware Security Module\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/hardware-security-module\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+hardware-security-module\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Hardware Security Module<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Linux\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/linux\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+linux\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Linux<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Google Cloud Platform\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/google-cloud-platform\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+google-cloud-platform\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Google Cloud Platform<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"MySQL\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mysql\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+mysql\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">MySQL<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Relational database\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/relational-database\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+relational-database\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Relational database<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"quantum computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/quantum-computing\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+quantum-computing\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">quantum computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"server-side encryption\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/server-side-encryption\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+server-side-encryption\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">server-side encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"OpenSSH\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/openssh\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+openssh\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">OpenSSH<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"microsoft-azure\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/microsoft-azure\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+microsoft-azure\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">microsoft-azure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cyberforensics\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cyberforensics\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+cyberforensics\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">cyberforensics<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"containers\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/containers\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+containers\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">containers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Databases\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/databases\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+databases\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Databases<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"network time protocol\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/network-time-protocol\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+network-time-protocol\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">network time protocol<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Windows Azure\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/windows-azure\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+windows-azure\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Windows Azure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"AWS Key Management Service\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/aws-key-management-service\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+aws-key-management-service\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">AWS Key Management Service<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Perfect Forward Secrecy\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/perfect-forward-secrecy\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+perfect-forward-secrecy\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Perfect Forward Secrecy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"HSM\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/hsm\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+hsm\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">HSM<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Outlook.com\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/outlook-com\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+outlook-com\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Outlook.com<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"AES\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/aes\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+aes\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">AES<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"pgp\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/pgp\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+pgp\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">pgp<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Google Drive\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/google-drive\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+google-drive\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Google Drive<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Transport Layer Security\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/transport-layer-security\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+transport-layer-security\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Transport Layer Security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Docker container technology\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/docker-container-technology\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+docker-container-technology\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Docker container technology<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Key management\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/key-management\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+key-management\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Key management<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"RSA\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/rsa\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+rsa\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">RSA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"TrueCrypt\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/truecrypt\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+truecrypt\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">TrueCrypt<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-6\" class=\"facet-companies facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Companies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Google\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/google\/\"><span class=\"bar\" style=\"width:41.176470588235%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/google\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"7 topics\">Google<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/microsoft\/\"><span class=\"bar\" style=\"width:35.294117647059%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/microsoft\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"6 topics\">Microsoft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/amazon\/\"><span class=\"bar\" style=\"width:29.411764705882%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/amazon\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"5 topics\">Amazon<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"National Security Agency (NSA)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/national-security-agency-nsa\/\"><span class=\"bar\" style=\"width:23.529411764706%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/national-security-agency-nsa\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"4 topics\">National Security Agency (NSA)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"IBM\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ibm\/\"><span class=\"bar\" style=\"width:11.764705882353%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/ibm\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">IBM<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dropbox\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/dropbox\/\"><span class=\"bar\" style=\"width:11.764705882353%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/dropbox\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Dropbox<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"RSA\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/rsa\/\"><span class=\"bar\" style=\"width:11.764705882353%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/rsa\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">RSA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Juniper Networks\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/juniper-networks\/\"><span class=\"bar\" style=\"width:11.764705882353%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/juniper-networks\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Juniper Networks<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hewlett-Packard (HP)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/hewlett-packard-hp\/\"><span class=\"bar\" style=\"width:11.764705882353%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/hewlett-packard-hp\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Hewlett-Packard (HP)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Linux Foundation\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/linux-foundation\/\"><span class=\"bar\" style=\"width:11.764705882353%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/linux-foundation\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Linux Foundation<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"EMC\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/emc\/\"><span class=\"bar\" style=\"width:11.764705882353%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/emc\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">EMC<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cisco Systems\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cisco-systems\/\"><span class=\"bar\" style=\"width:11.764705882353%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/cisco-systems\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"2 topics\">Cisco Systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"nCrypted Cloud\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ncrypted-cloud\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/ncrypted-cloud\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">nCrypted Cloud<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Box\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/box\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/box\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Box<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mandiant\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/mandiant\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/mandiant\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Mandiant<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Massachusetts Institute of Technology (MIT)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/massachusetts-institute-of-technology-mit\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/massachusetts-institute-of-technology-mit\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Massachusetts Institute of Technology (MIT)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"HighCloud Security\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/highcloud-security\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/highcloud-security\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">HighCloud Security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cyber Threat Intelligence Integration Center\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cyber-threat-intelligence-integration-center\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/cyber-threat-intelligence-integration-center\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Cyber Threat Intelligence Integration Center<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Facebook\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/facebook\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/facebook\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Facebook<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hytrust\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/hytrust\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/hytrust\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">hytrust<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FireEye\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/fireeye\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/fireeye\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">FireEye<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Taia Global\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/taia-global\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/taia-global\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Taia Global<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"China Unicom\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/china-unicom\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/china-unicom\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">China Unicom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CERN\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cern\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/cern\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">CERN<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Yahoo\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/yahoo\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/yahoo\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Yahoo<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Obama administration\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/obama-administration\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/obama-administration\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Obama administration<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Harvard University\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/harvard-university\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/harvard-university\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Harvard University<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Piper Jaffray\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/piper-jaffray\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/piper-jaffray\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Piper Jaffray<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Adobe\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/adobe\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/adobe\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Adobe<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Voltage Security\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/voltage-security\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/voltage-security\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Voltage Security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"MySQL\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/mysql\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/mysql\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">MySQL<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Docker\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/docker\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/docker\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Docker<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sony\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sony\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/sony\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Sony<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"ProtonMail\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/protonmail\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/protonmail\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">ProtonMail<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"KnowBe4\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/knowbe4\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/knowbe4\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">KnowBe4<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CloudFlare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cloudflare\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/cloudflare\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">CloudFlare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"JPMorgan Chase\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/jpmorgan-chase\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/jpmorgan-chase\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">JPMorgan Chase<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Oracle\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/oracle\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/oracle\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Oracle<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Aurora\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/aurora\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/company\/aurora\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Aurora<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-11\" class=\"facet-people facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">People<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Edward Snowden\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/edward-snowden\/\"><span class=\"bar\" style=\"width:17.647058823529%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/edward-snowden\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"3 topics\">Edward Snowden<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Werner Vogels\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/werner-vogels\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/werner-vogels\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Werner Vogels<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lisa Monaco\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/lisa-monaco\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/lisa-monaco\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Lisa Monaco<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Corey Sanders\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/corey-sanders\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/corey-sanders\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Corey Sanders<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Matt Thomlinson\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/matt-thomlinson\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/matt-thomlinson\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Matt Thomlinson<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jason Stockman\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/jason-stockman\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/jason-stockman\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Jason Stockman<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bill Veghte\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/bill-veghte\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/bill-veghte\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Bill Veghte<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Andy Jassy\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/andy-jassy\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/person\/andy-jassy\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Andy Jassy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-2\" class=\"facet-tags facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Other<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"the week in cloud\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/the-week-in-cloud\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/the-week-in-cloud\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">the week in cloud<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"privacy\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/privacy\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/privacy\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">privacy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mikko Hypp\u00f6nen\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mikko-hypponen\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/mikko-hypponen\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Mikko Hypp\u00f6nen<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"f-secure\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/f-secure\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/f-secure\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">f-secure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-security\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/cloud-security\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">cloud security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Azure Key Vault\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/azure-key-vault\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/azure-key-vault\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Azure Key Vault<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"RSA\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/rsa\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/rsa\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">RSA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Alyun\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/alyun\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/alyun\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Alyun<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"alibaba\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/alibaba\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/alibaba\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">alibaba<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Structure 2014\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/structure-2014\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/structure-2014\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Structure 2014<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"AWS Re:Invent 2004\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/aws-reinvent-2004\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/aws-reinvent-2004\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">AWS Re:Invent 2004<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Structure\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/structure\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/structure\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Structure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"China\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/china\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/china\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">China<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"The A.M. Turing Award\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/the-a-m-turing-award\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/the-a-m-turing-award\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">The A.M. Turing Award<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"code breaking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/code-breaking\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/code-breaking\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">code breaking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Alan Turing\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/alan-turing\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/alan-turing\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Alan Turing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Eric Chiu\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/eric-chiu\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/eric-chiu\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Eric Chiu<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cyber Threat Intelligence Integration Center\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cyber-threat-intelligence-integration-center\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/cyber-threat-intelligence-integration-center\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Cyber Threat Intelligence Integration Center<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"ProtonMail\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/protonmail\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/protonmail\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">ProtonMail<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Openwall\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/openwall\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/openwall\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Openwall<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CodePainters\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/codepainters\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/codepainters\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">CodePainters<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Re:invent 2014\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/reinvent-2014\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/reinvent-2014\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Re:invent 2014<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mandiant\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mandiant\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/mandiant\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">Mandiant<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"server-side encryption\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/server-side-encryption\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/server-side-encryption\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">server-side encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"AWS Key Management Service\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/aws-key-management-service\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/aws-key-management-service\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">AWS Key Management Service<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"TrueCrypt\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/truecrypt\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/truecrypt\/?technology=encryption&#038;authors=cap-barbdarrow\" class=\"term-link\" title=\"1 topics\">TrueCrypt<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-8\" class=\"facet-author widget widget_scriblio_facets\"><header class=\"widget-title\">Author<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"Barb Darrow\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/barbdarrow\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/\" class=\"term-link\" title=\"17 topics\">Barb Darrow<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>17<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-3\" class=\"facet-post-type widget widget_scriblio_facets\"><header class=\"widget-title\">Content Type<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/news-post\/\"><span class=\"bar\" style=\"width:76.470588235294%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-barbdarrow&#038;go-type=news-post\" class=\"term-link\" title=\"13 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>13<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"audio\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/audio\/\"><span class=\"bar\" style=\"width:5.8823529411765%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-barbdarrow&#038;go-type=audio\" class=\"term-link\" title=\"1 topics\">audio<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-5\" class=\"facet-property widget widget_scriblio_facets\"><header class=\"widget-title\">Property<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Gigaom\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/gigaom\/\"><span class=\"bar\" style=\"width:82.352941176471%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-barbdarrow&#038;go-property=gigaom\" class=\"term-link\" title=\"14 topics\">Gigaom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>14<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-10\" class=\"facet-availability widget widget_scriblio_facets\"><header class=\"widget-title\">Access<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Free\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/free\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-barbdarrow&#038;go-availability=free\" class=\"term-link\" title=\"17 topics\">Free<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>17<\/span><\/a><\/li>\n<\/ul>\n<\/div>";
