<html><body><div style="color:#000; background-color:#fff; font-family:times new roman, new york, times, serif;font-size:16px"><div id="yui_3_16_0_1_1435909806417_2438"><span id="yui_3_16_0_1_1435909806417_2585">Worth reading!</span></div><div id="yui_3_16_0_1_1435909806417_2438"><span><br></span></div><div id="yui_3_16_0_1_1435909806417_2438"><span id="yui_3_16_0_1_1435909806417_2586">Gist: cyber product technology remains archaic!</span></div><div id="yui_3_16_0_1_1435909806417_2438"><span><br></span></div><div id="yui_3_16_0_1_1435909806417_2438"><span id="yui_3_16_0_1_1435909806417_2587">Read on.</span></div><div id="yui_3_16_0_1_1435909806417_2438"><span><br></span></div><div id="yui_3_16_0_1_1435909806417_2438"><span><br></span></div><h1 class="" itemprop="headline" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; outline: none; text-rendering: optimizeLegibility; zoom: 1; margin-top: 0px; margin-bottom: 0.5em; border: 0px; font-family: 'ARS Maquette', 'Helvetica Neue', sans-serif; font-size: 3em; font-stretch: inherit; line-height: 1.15; vertical-align: baseline;" id="yui_3_16_0_1_1435909806417_2590"><a href="http://thenextweb.com/insider/2015/07/02/the-cybersecurity-industrys-billion-dollar-scam/?utm_campaign=pro&utm_content=116910&utm_source=social&utm_medium=feed" id="yui_3_16_0_1_1435909806417_2728">The cybersecurity industry’s billion dollar scam</a><br></h1><div style="width:450px; font-family: 'Georgia', 'Times', 'Times New Roman', 'serif';margin-top:5px; margin-bottom: 5px; background-color: #ffffff;" contenteditable="false" id="enhancrCard_0" class="link-enhancr-attachment link-enhancr-element "><table class="link-enhancr-element" cellspacing="0" cellpadding="0" border="0" style="width:450px; height:170px; position: relative; display: block;"><tbody><tr class="link-enhancr-element"><td class="link-enhancr-element" colspan="8" style="height: 1px; background-color: #e5e5e5; font-size: 1px; border-collapse: collapse;"><div class="link-enhancr-element" style="height: 1px; background-color: #e5e5e5; font-size: 1px; line-height:0px;"> </div></td></tr><tr class="link-enhancr-element"><td rowspan="5" class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td><td class="link-enhancr-element link-enhancr-image-wrap" rowspan="5" style="vertical-align: middle; width: 168px; height: 168px; background-color: #000000;border-collapse: collapse;"><div class="link-enhancr-element" style="width: 168px;" align="center"><a href="http://thenextweb.com/insider/2015/07/02/the-cybersecurity-industrys-billion-dollar-scam/?utm_campaign=pro&utm_content=116910&utm_source=social&utm_medium=feed" class="link-enhancr-card-urlWrapper link-enhancr-element" style="text-decoration: none !important; color: #000000 !important;"><img alt="image" src="http://cdn1.tnwcdn.com/wp-content/blogs.dir/1/files/2015/07/hacking.jpg" class="link-enhancr-thumbnail-image link-enhancr-element yahoo-ignore-inline-image" width="168" height="85" style="display: block; margin: auto;" data-id="4f725367-161d-8568-c8c5-4759357a6a0d"></a></div></td><td rowspan="5" class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td><td rowspan="5" class="link-enhancr-element" style="width: 14px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 14px; background-color: #ffffff; font-size: 14pt;"> </div></td><td colspan="2" class="link-enhancr-element" style="height: 6px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="height: 6px; background-color: #ffffff; font-size: 6pt;"> </div></td><td rowspan="5" class="link-enhancr-element" style="width: 20px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 20px; background-color: #ffffff; font-size: 20pt;"> </div></td><td class="link-enhancr-element" rowspan="5" width="1" style="width: 1px; background-color: #e5e5e5; font-size: 1pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td></tr><tr><td class="link-enhancr-element" colspan="2" style="width: 100%; vertical-align: middle; font-family: 'Georgia', 'Times', 'Times New Roman', 'serif';"><div class="link-enhancr-text-part link-enhancr-element" style="line-height:16.5px; background-color: #ffffff; height: 135px; width: 245px;"><div class="link-enhancr-element" style="word-wrap: break-word; word-break: break-all;"><span class="link-enhancr-element icon  icon-shrink link-enhancr-toggle"></span><span class="link-enhancr-element icon icon-close link-enhancr-delete"></span><a href="http://thenextweb.com/insider/2015/07/02/the-cybersecurity-industrys-billion-dollar-scam/?utm_campaign=pro&utm_content=116910&utm_source=social&utm_medium=feed" class="link-enhancr-card-urlWrapper link-enhancr-element" style="text-decoration: none !important; color: #000000 !important; line-height: 100%; font-size: 18px; display: block;"><span class="link-enhancr-element link-enhancr-card-title" style="margin: 0; font-weight: normal;margin-bottom: 3px; font-size: 18px; line-height: 21px; max-height: 43px; color: #000000; overflow: hidden !important; display: inline-block;">The cybersecurity industry’s billion dollar scam</span></a><div style="font-size: 13px; line-height: 20px; color: #999999; max-height: 81px; font-family: 'Georgia', 'Times', 'Times New Roman', 'serif';overflow: hidden;" class="link-enhancr-card-description link-enhancr-element">The cybersecurity industry can be romanticized as a crime-fighting cabal of protectors facing off against hackers to keep the Internet safe. In this version of the ...</div></div></div></td></tr><tr><td colspan="2" class="link-enhancr-element" style="height: 4px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="height: 4px; background-color: #ffffff; font-size: 4pt;"></div></td></tr><tr><td class="link-enhancr-element" style="vertical-align: middle; font-family: 'Arial', 'Helvetica Neue', 'Helvetica', 'sans-serif';"><div class="link-enhancr-element" style="font-size: 0pt;"><a href="http://thenextweb.com/insider/2015/07/02/the-cybersecurity-industrys-billion-dollar-scam/?utm_campaign=pro&utm_content=116910&utm_source=social&utm_medium=feed" class="link-enhancr-card-url link-enhancr-element" style="color: black; text-decoration: none !important;cursor:pointer !important;" target="_blank"><span class="link-enhancr-element link-enhancr-view-on" style="display: inline-block; line-height: 11px; max-width: 145px; min-width: 85px; overflow: hidden; max-height: 13px; word-break: break-all;" id="yui_3_16_0_1_1435909806417_2744"><span class="link-enhancr-element link-enhancr-mobile-no-resize" style="vertical-align:middle; font-size: 9px; line-height: 11px; color: #999999; -moz-text-size-adjust: none; -ms-text-size-adjust: none; -webkit-text-size-adjust:none; text-size-adjust:none;">View on <span style="font-weight: bold" class="link-enhancr-view-on-domain">thenextweb.com</span></span></span></a></div></td><td class="link-enhancr-element" style="vertical-align: middle; width: 100px; font-family: 'Arial', 'Helvetica Neue', 'Helvetica', 'sans-serif';"><div class="link-enhancr-element link-enhancr-preview-wrapper" style="max-width: 100px; min-width: 80px; overflow: hidden; text-align: right; line-height: 11px; max-height: 13px; font-size: 0pt;"><span class="link-enhancr-element link-enhancr-preview-by link-enhancr-mobile-no-resize" style="vertical-align:middle; font-size: 9px; line-height: 11px; color: #999999; -moz-text-size-adjust: none; -ms-text-size-adjust: none; -webkit-text-size-adjust:none; text-size-adjust:none;">Preview by Yahoo</span></div></td></tr><tr><td colspan="2" class="link-enhancr-element" style="height: 9px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="height: 9px; background-color: #ffffff; font-size: 9pt;"></div></td></tr><tr class="link-enhancr-element"><td class="link-enhancr-element" colspan="8" style="height: 1px; background-color: #e5e5e5; font-size: 1px; border-collapse: collapse;"><div class="link-enhancr-element" style="height: 1px; background-color: #e5e5e5; font-size: 1px; line-height:0px"> </div></td></tr></tbody></table></div><div id="yui_3_16_0_1_1435909806417_2438"><span><br></span></div><div></div><div id="yui_3_16_0_1_1435909806417_2373"> </div><div class="signature" id="yui_3_16_0_1_1435909806417_2367"><div id="yui_3_16_0_1_1435909806417_2369"><font size="2" id="yui_3_16_0_1_1435909806417_2372"><span style="font-family:times, serif;" id="yui_3_16_0_1_1435909806417_2371">----------------------------------------------------------------------------------------------</span><br style="font-family:times, serif;"></font><font size="2" id="yui_3_16_0_1_1435909806417_2463"><span style="font-family:times, serif;" id="yui_3_16_0_1_1435909806417_2462">Matunda Nyanchama, PhD, CISSP; mnyanchama@aganoconsulting.com</span><br style="font-family:times, serif;"><span style="font-family:times, serif;" id="yui_3_16_0_1_1435909806417_2526">Agano Consulting Inc.;  </span><a rel="nofollow" style="font-family:times, serif;" target="_blank" href="http://www.aganoconsulting.com/" id="yui_3_16_0_1_1435909806417_2892">www.aganoconsulting.com</a>; </font><font class="Apple-style-span" size="2" id="yui_3_16_0_1_1435909806417_2935">Twitter: <a rel="nofollow" target="_blank" href="http://twitter.com/#%21/nmatunda" id="yui_3_16_0_1_1435909806417_2934"><span class="yshortcuts" id="lw_1298476732_5" style="color:rgb(54, 99, 136);">nmatunda;  </span></a></font><font class="Apple-style-span" size="2" id="yui_3_16_0_1_1435909806417_2370"><span style="text-decoration:underline;"></span>Skype: okiambe</font><font size="2" id="yui_3_16_0_1_1435909806417_2891"><br style="font-family:times, serif;"><span style="font-family:times, serif;" id="yui_3_16_0_1_1435909806417_2890">----------------------------------------------------------------------------------------------</span></font></div><div style="font-family:times, serif;" id="yui_3_16_0_1_1435909806417_2368"><font size="2">Manage your ICT risks</font><span style="line-height:1.22;font-size:10pt;" id="yui_3_16_0_1_1435909806417_2871">! We are the experts you need! The trusted partners you deserve!</span></div><div id="yui_3_16_0_1_1435909806417_2366"><span style="font-family:times, serif;" id="yui_3_16_0_1_1435909806417_2875"><span style="font-size:10pt;" id="yui_3_16_0_1_1435909806417_2874">Call: <span style="font-weight:bold;" id="yui_3_16_0_1_1435909806417_2889">+1-888-587-1150 (Canada) +254-20-267-0743 (Kenya) </span>or <a rel="nofollow" id="yui_3_16_0_1_1435909806417_2873" href=""><span style="font-weight:bold;" id="yui_3_16_0_1_1435909806417_2872">info@aganoconsulting.com</span></a></span></span></div><div style="color:rgb(0, 0, 255);font-family:times, serif;" id="yui_3_16_0_1_1435909806417_2876"><span style="line-height:16px;font-weight:bold;" id="yui_3_16_0_1_1435909806417_2888"><var id="yui-ie-cursor"></var>Licensed by Communications Authority of Kenya (CA)</span></div><div style="color:rgb(0, 0, 255);font-family:times, serif;font-style:italic;" id="yui_3_16_0_1_1435909806417_2877"><span style="font-size:10pt;"> </span>----------------------------------------------------------------------------------------------<span lang="EN-CA"></span></div><div id="yui_3_16_0_1_1435909806417_2879"><span style="font-family:times, serif;" id="yui_3_16_0_1_1435909806417_2887"><div class="MsoPlainText" id="yui_3_16_0_1_1435909806417_2886">"The best revenge is massive success" - Frank Sinatra<span style="font-style:italic;"></span></div></span><span style="font-family:times, serif;" id="yui_3_16_0_1_1435909806417_2878">-----------------------------------------------------------------------------------------------</span><br style="font-family:times, serif;"><font size="1" style="font-family:times, serif;" id="yui_3_16_0_1_1435909806417_2880">This e-mail, including attachments, may be privileged and may contain confidential or proprietary information intended only for the addressee(s). Any other distribution, copying, use, or disclosure is unauthorized and strictly prohibited. If you have received this message in error, please notify the sender immediately by reply e-mail and permanently delete the message, including any attachments, without making a copy. Thank you.</font><br></div></div></div></body></html>