The Cyber Security Microblog
Short, Direct & Timely Posts - Written by Terje Wold
Click here to navigate
  • Home
  • Categories
    • Encryption
    • Ensafer
    • Future Tech
    • Hackers
    • Products
    • Security
    • Silicon Valley
    • Social Media
  • My Personal Blog
  • My Company
  • My Social Media
  • About Me
Threat Horizon 2018: 9 Big Security Threats

Threat Horizon 2018: 9 Big Security Threats

The Information Security Forum (ISF)* recently launched "Threat Horizon 2018", which is the latest in a series of annual threat reports. It highlights how the confidentiality, integrity and availability of…Read more
Next Wave of Cybercrime Will Come Through Your Smart TV

Next Wave of Cybercrime Will Come Through Your Smart TV

We all know that cybercrime is a fast growing area that will affect most people and organizations in the future. And it’s penetrating more and more areas of the society…Read more
Apple CEO defends encryption amidst terrorist concerns

Apple CEO defends encryption amidst terrorist concerns

Apple CEO Tim Cook staunchly defended personal privacy and the use of encryption on iPhones amidst renewed concerns about terrorists hiding covert electronic messages when they plan deadly attacks. He…Read more
7 Reasons Why the Feds Shouldn’t Mess with Encryption

7 Reasons Why the Feds Shouldn’t Mess with Encryption

My company Invenia in Norway has been working with encryption for the last ten years. We've developed a technology for end-to-end encryption called Ensafer. So I'm more than average interested…Read more
Are Your Biggest Security Threats on the Inside?

Are Your Biggest Security Threats on the Inside?

If you ask security experts about cyber security, you’ll probably hear about all sorts of external threats, like malware, hackers, spyware, DOS attacks and similar stuff. But what if the bigger and…Read more
Happy New Cyber Security Year 2015! :-)

Happy New Cyber Security Year 2015! :-)

A new year has begun and let’s wish that 2015 will be a year with less cyber crime and data breaches than last year. OK? Well, dream on. Let’s face it;…Read more
Avoid the 12 Scams of the Holidays [Infographic]

Avoid the 12 Scams of the Holidays [Infographic]

As the holiday season nears, we'll be swarming online shops for deals on gifts and travel. Protect yourself when you browse, click, and buy online, and avoid the 12 Scams…Read more
Disclosed: How a Nation State Used Regin for Cyber Espionage

Disclosed: How a Nation State Used Regin for Cyber Espionage

Yesterday I wrote the blog post "Wearable Tech: Improving Your Health or Killing Your Privacy?" based on a security report from Symantec. Little did I know that I would write a…Read more
Wearable Tech: Improving Your Health or Killing Your Privacy?

Wearable Tech: Improving Your Health or Killing Your Privacy?

Your smartphone is already gathering a ton of information about you - everyday. Intentionally or not you are tracking yourself. But that's nothing compared to what's about to happen when…Read more
50 Years of BASIC: The Programming Language That Made Computers Personal

50 Years of BASIC: The Programming Language That Made Computers Personal

Congratulations! Today on May 1st 2014 BASIC celebrates its 50th birthday. The researchers John G. Kemeny and Thomas E. Kurtz designed the original BASIC language at Dartmouth College in New Hampshire…Read more
Older Posts →