Technical insights and best practices for Security & Compliance
Default Docker configurations are dangerous. Learn how to drop capabilities, enforce non-root users, and isolate kernels to satisfy Datatilsynet and sleep at night.
Containers are not magic security boxes. From kernel exploits to network breaches, here is how to harden your Docker stack before the GDPR deadline hits.
RAID is not a backup. In this deep dive, we explore RTO/RPO strategies, script automated offsite backups with rsync, and discuss why data sovereignty in Norway matters more than ever before the 2018 GDPR rollout.
With the GDPR deadline looming in 2018, manual server hardening is a liability. Learn how to automate security baselines using Ansible and OpenSCAP on Norwegian infrastructure.
The perimeter firewall is dead. With GDPR looming in 2018, relying on a 'trusted internal network' is negligence. Here is how to lock down your infrastructure using standard Linux tools, paranoia, and CoolVDS isolation.
With the GDPR enforcement date looming, the traditional 'castle and moat' security strategy is becoming a liability. We dismantle the perimeter and build a Zero-Trust model using KVM isolation, micro-segmentation, and rigorous identity management.
The 'castle-and-moat' security strategy is failing. In a world of ransomware and looming GDPR regulations, here is how to implement a Zero-Trust model using standard Linux tools available today.
The traditional VPN-based security model is failing. Learn how to implement a Zero-Trust architecture using KVM isolation, strict iptables segmentation, and mutual TLS to future-proof your Norwegian hosting stack before the 2018 GDPR enforcement.
Perimeter security is no longer sufficient. Learn how to implement a Zero Trust model using Nginx mTLS, strict SSH 2FA, and segmented networking on KVM VPS, preparing your stack for the upcoming 2018 GDPR enforcement.
The traditional VPN castle-and-moat security model is obsolete. With GDPR looming, learn how to implement Google-style BeyondCorp principles using Nginx mTLS, iptables, and strict KVM isolation.
The 'perimeter' security model is dead. With GDPR looming and ransomware evolving, reliance on a single firewall is negligence. Here is how to implement a pragmatic Zero-Trust architecture on your VPS right now.
The 'castle and moat' security strategy is obsolete. With GDPR enforcement looming and sophisticated lateral attacks on the rise, Norwegian CTOs must pivot to a Zero-Trust model. Here is how to implement Google-style BeyondCorp security on your Linux infrastructure today.
Hardware fails, and fat fingers destroy databases. In this 2017 guide, we ditch the fluff and build a battle-tested Disaster Recovery plan using MySQL 5.7 replication, lsyncd, and Norwegian data sovereignty principles.
We analyze the Dirty COW aftermath, user namespaces in Docker 1.12, and why true KVM isolation on Norwegian soil is your only defense against shared-kernel vulnerabilities.
It is late 2016. The Safe Harbor framework is dead. Ransomware is evolving. Merely copying files is no longer a strategy. Here is how to architect a geo-redundant disaster recovery plan using KVM, ZFS, and Norwegian data sovereignty.
Post-Mirai botnet analysis: Why your 'backup script' isn't a Disaster Recovery Plan. We break down Master-Slave replication on Ubuntu 16.04, the legal reality of data residency in Norway, and why NVMe restores save jobs.
The 'Castle and Moat' security strategy is dead. In this guide, we dismantle the perimeter and implement strict access controls, 2FA SSH, and encrypted tunnels on Ubuntu 16.04, ensuring your data in Norway remains untouchable.
With the Safe Harbor framework invalidated and new EU regulations looming, manual security hardening is a liability. Learn how to automate server compliance using Ansible on CentOS 7 to satisfy auditors and secure your Nordic infrastructure.
The 'castle and moat' security strategy is dead. Learn how to implement a Zero-Trust architecture on Linux using Nginx mTLS, hardened SSH, and strict iptables rules on your VPS.
With the EU's new data protection regulations looming, manual server hardening is a liability. Learn how to automate security compliance using Ansible on strict KVM infrastructure.
Docker is not a virtualization strategy; it is a delivery mechanism. We dissect kernel namespaces, capability dropping, and why running containers on KVM-backed infrastructure is the only way to satisfy Norwegian compliance standards.
It is late 2016. Safe Harbor is dead, ransomware is rampant, and your RTO is likely a lie. Here is how to build a battle-tested Disaster Recovery plan using KVM, NVMe, and Norwegian data sovereignty.
With the recent invalidation of Safe Harbor and the looming EU Data Protection Reform, manual security is a liability. Learn how to automate server hardening on CentOS 7 and Ubuntu 16.04 using Ansible to satisfy Datatilsynet requirements.
Manual security checklists are a liability. Learn how to automate server hardening for the upcoming GDPR regulations using Ansible, OpenSCAP, and Norwegian-hosted KVM infrastructure.
With the General Data Protection Regulation looming and Safe Harbor dead, manual security hardening is a liability. Here is how to automate server compliance using Ansible on Norwegian infrastructure.
The 'Castle and Moat' security model has failed. Learn how to architect a Zero-Trust environment using strict iptables, 2FA, and segmented networks on CoolVDS infrastructure. Stop trusting your LAN.
With Safe Harbor dead and the GDPR clock ticking, manual server hardening is a liability. Here is how to use Ansible and OpenSCAP to enforce Norwegian compliance standards on CentOS 7.
With the recent death of Safe Harbor and the looming GDPR enforcement, the 'castle and moat' security strategy is obsolete. Here is a pragmatic guide to implementing micro-segmentation and strict access controls on your Norwegian VPS infrastructure.
Docker is revolutionizing deployment, but default settings are a security nightmare. We dive into kernel capabilities, user namespaces, and why KVM isolation is critical for Norwegian data integrity.
With the recent adoption of the GDPR and the death of Safe Harbor, manual security auditing is a liability. Learn how to implement 'Compliance as Code' using OpenSCAP and Ansible on strictly isolated KVM instances.