{"id":1352,"date":"2012-05-31T19:07:01","date_gmt":"2012-05-31T19:07:01","guid":{"rendered":"https:\/\/iissonline.net\/2026\/?p=1352"},"modified":"2012-05-31T19:07:01","modified_gmt":"2012-05-31T19:07:01","slug":"cyberthreats-turn-into-megabucks-for-defense-companies","status":"publish","type":"post","link":"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/","title":{"rendered":"Cyberthreats Turn Into Megabucks For Defense Companies"},"content":{"rendered":"<p>Politico.com May 31, 2012 Cyberthreats Turn Into Megabucks For Defense Companies By Tony Romm and Jennifer Martinez As Congress boosts spending on cybersecurity and mulls over new data safety requirements on&hellip;<\/p>\n<p>You must be logged in to view this content.<\/p>\n<h3>Click here to <a href=\"\/register\">register<\/a><\/h3>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Politico.com May 31, 2012 Cyberthreats Turn Into Megabucks For Defense Companies By Tony Romm and Jennifer Martinez As Congress boosts spending on cybersecurity and mulls over new data safety requirements on&hellip; You must be logged in to view this content. &hellip; <a href=\"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[13,14],"tags":[54,113],"class_list":["post-1352","post","type-post","status-publish","format-standard","hentry","category-companies","category-contracts","tag-comapnies","tag-contracts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberthreats Turn Into Megabucks For Defense Companies - Isenberg Institute of Strategic Satire<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberthreats Turn Into Megabucks For Defense Companies - Isenberg Institute of Strategic Satire\" \/>\n<meta property=\"og:description\" content=\"Politico.com May 31, 2012 Cyberthreats Turn Into Megabucks For Defense Companies By Tony Romm and Jennifer Martinez As Congress boosts spending on cybersecurity and mulls over new data safety requirements on&hellip; You must be logged in to view this content. &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/\" \/>\n<meta property=\"og:site_name\" content=\"Isenberg Institute of Strategic Satire\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-31T19:07:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/cyberthreats-turn-into-megabucks-for-defense-companies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/cyberthreats-turn-into-megabucks-for-defense-companies\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#\\\/schema\\\/person\\\/d9e91fd1a1523b3c7eebbee93de450a1\"},\"headline\":\"Cyberthreats Turn Into Megabucks For Defense Companies\",\"datePublished\":\"2012-05-31T19:07:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/cyberthreats-turn-into-megabucks-for-defense-companies\\\/\"},\"wordCount\":1349,\"commentCount\":0,\"keywords\":[\"Companies\",\"Contracts\"],\"articleSection\":[\"Companies\",\"Contracts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/iissonline.net\\\/2026\\\/cyberthreats-turn-into-megabucks-for-defense-companies\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/cyberthreats-turn-into-megabucks-for-defense-companies\\\/\",\"url\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/cyberthreats-turn-into-megabucks-for-defense-companies\\\/\",\"name\":\"Cyberthreats Turn Into Megabucks For Defense Companies - Isenberg Institute of Strategic Satire\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#website\"},\"datePublished\":\"2012-05-31T19:07:01+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#\\\/schema\\\/person\\\/d9e91fd1a1523b3c7eebbee93de450a1\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/cyberthreats-turn-into-megabucks-for-defense-companies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/iissonline.net\\\/2026\\\/cyberthreats-turn-into-megabucks-for-defense-companies\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/cyberthreats-turn-into-megabucks-for-defense-companies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberthreats Turn Into Megabucks For Defense Companies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#website\",\"url\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/\",\"name\":\"Isenberg Institute of Strategic Satire\",\"description\":\"Unpacking the Private Military Complex\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#\\\/schema\\\/person\\\/d9e91fd1a1523b3c7eebbee93de450a1\",\"name\":\"\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g\"},\"url\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberthreats Turn Into Megabucks For Defense Companies - Isenberg Institute of Strategic Satire","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/","og_locale":"en_US","og_type":"article","og_title":"Cyberthreats Turn Into Megabucks For Defense Companies - Isenberg Institute of Strategic Satire","og_description":"Politico.com May 31, 2012 Cyberthreats Turn Into Megabucks For Defense Companies By Tony Romm and Jennifer Martinez As Congress boosts spending on cybersecurity and mulls over new data safety requirements on&hellip; You must be logged in to view this content. &hellip; Continue reading &rarr;","og_url":"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/","og_site_name":"Isenberg Institute of Strategic Satire","article_published_time":"2012-05-31T19:07:01+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/#article","isPartOf":{"@id":"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/"},"author":{"name":"","@id":"https:\/\/iissonline.net\/2026\/#\/schema\/person\/d9e91fd1a1523b3c7eebbee93de450a1"},"headline":"Cyberthreats Turn Into Megabucks For Defense Companies","datePublished":"2012-05-31T19:07:01+00:00","mainEntityOfPage":{"@id":"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/"},"wordCount":1349,"commentCount":0,"keywords":["Companies","Contracts"],"articleSection":["Companies","Contracts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/","url":"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/","name":"Cyberthreats Turn Into Megabucks For Defense Companies - Isenberg Institute of Strategic Satire","isPartOf":{"@id":"https:\/\/iissonline.net\/2026\/#website"},"datePublished":"2012-05-31T19:07:01+00:00","author":{"@id":"https:\/\/iissonline.net\/2026\/#\/schema\/person\/d9e91fd1a1523b3c7eebbee93de450a1"},"breadcrumb":{"@id":"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/iissonline.net\/2026\/cyberthreats-turn-into-megabucks-for-defense-companies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/iissonline.net\/2026\/"},{"@type":"ListItem","position":2,"name":"Cyberthreats Turn Into Megabucks For Defense Companies"}]},{"@type":"WebSite","@id":"https:\/\/iissonline.net\/2026\/#website","url":"https:\/\/iissonline.net\/2026\/","name":"Isenberg Institute of Strategic Satire","description":"Unpacking the Private Military Complex","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/iissonline.net\/2026\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/iissonline.net\/2026\/#\/schema\/person\/d9e91fd1a1523b3c7eebbee93de450a1","name":"","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g"},"url":"https:\/\/iissonline.net\/2026\/author\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/phczRl-lO","_links":{"self":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/posts\/1352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/comments?post=1352"}],"version-history":[{"count":0,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/posts\/1352\/revisions"}],"wp:attachment":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/media?parent=1352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/categories?post=1352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/tags?post=1352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}