{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - Espen Otterstad","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/espeno","_microblog":{"about":"https://micro.blog/about/api","id":"1751209","username":"espeno","bio":"CISO at a SaaS company delivering next-level contact center solutions in the Nordics. My opinions are my own.","pronouns":"he/him","is_following":false,"is_you":false,"following_count":1,"discover_count":0},"author":{"name":"Espen Otterstad","url":"https://espeno.micro.blog/","avatar":"https://www.gravatar.com/avatar/6698c2a78a5a98ffe3d3fbba69db758f?s=96&d=https%3A%2F%2Fmicro.blog%2Fimages%2Fblank_avatar.png"},"items":[{"id":"73142385","content_html":"<p>EU's Combat Child Sexual Abuse (CSAR), more commonly known as \"chatcontrol\": <a href=\"https://otterstad.me/2025/09/09/eus-combat-child-sexual-abuse.html\">otterstad.me</a></p>","summary":"","url":"https://otterstad.me/2025/09/09/eus-combat-child-sexual-abuse.html","date_published":"2025-09-09T12:03:07+00:00","author":{"name":"Espen Otterstad","url":"https://espeno.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F6698c2a78a5a98ffe3d3fbba69db758f%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"espeno"}},"_microblog":{"date_relative":"2025-09-09 12:03","date_timestamp":1757419387,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"70686421","content_html":"<p>Two similarities between keeping fit and information security: <a href=\"https://otterstad.me/2025/08/07/two-similarities-between-keeping-fit.html\">otterstad.me</a></p>","summary":"Past performance alone cannot ensure future success, making consistency and improvement of existing resources essential in both fitness and cybersecurity.","url":"https://otterstad.me/2025/08/07/two-similarities-between-keeping-fit.html","date_published":"2025-08-07T06:49:21+00:00","author":{"name":"Espen Otterstad","url":"https://espeno.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F6698c2a78a5a98ffe3d3fbba69db758f%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"espeno"}},"_microblog":{"date_relative":"2025-08-07 06:49","date_timestamp":1754549361,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"61372477","content_html":"<p>We drown in metrics, but what do we do with them? <a href=\"https://otterstad.me/2025/04/03/we-drown-in-metrics-but.html\">otterstad.me</a></p>","summary":"Despite an abundance of cybersecurity metrics available, organizations struggle to derive actionable insights from them due to complexity and lack of context.","url":"https://otterstad.me/2025/04/03/we-drown-in-metrics-but.html","date_published":"2025-04-03T12:44:03+00:00","author":{"name":"Espen Otterstad","url":"https://espeno.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F6698c2a78a5a98ffe3d3fbba69db758f%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"espeno"}},"_microblog":{"date_relative":"2025-04-03 12:44","date_timestamp":1743684243,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}}]}