Console Login

Security & Compliance Articles

Technical insights and best practices for Security & Compliance

Security & Compliance

Container Security is a Minefield: Hardening Docker for Production in 2017

Default Docker configurations are dangerous. Learn how to drop capabilities, enforce non-root users, and isolate kernels to satisfy Datatilsynet and sleep at night.

Container Security in 2017: Locking Down Docker Production Environments in Norway

Containers are not magic security boxes. From kernel exploits to network breaches, here is how to harden your Docker stack before the GDPR deadline hits.

When RAID Fails: A Battle-Tested Disaster Recovery Guide for 2017

RAID is not a backup. In this deep dive, we explore RTO/RPO strategies, script automated offsite backups with rsync, and discuss why data sovereignty in Norway matters more than ever before the 2018 GDPR rollout.

Automating Security Compliance: Surviving the GDPR Prep on Bare-Metal KVM

With the GDPR deadline looming in 2018, manual server hardening is a liability. Learn how to automate security baselines using Ansible and OpenSCAP on Norwegian infrastructure.

Kill the VPN: Why Zero-Trust Architecture is the Only Way to Survive 2017

The perimeter firewall is dead. With GDPR looming in 2018, relying on a 'trusted internal network' is negligence. Here is how to lock down your infrastructure using standard Linux tools, paranoia, and CoolVDS isolation.

Perimeter Security is Dead: Implementing a Zero-Trust Architecture on Linux in 2017

With the GDPR enforcement date looming, the traditional 'castle and moat' security strategy is becoming a liability. We dismantle the perimeter and build a Zero-Trust model using KVM isolation, micro-segmentation, and rigorous identity management.

The Perimeter is Dead: Implementing a Zero-Trust Architecture on Linux Infrastructure

The 'castle-and-moat' security strategy is failing. In a world of ransomware and looming GDPR regulations, here is how to implement a Zero-Trust model using standard Linux tools available today.

The Perimeter is a Lie: Implementing Zero-Trust Architecture on Linux Infrastructure

The traditional VPN-based security model is failing. Learn how to implement a Zero-Trust architecture using KVM isolation, strict iptables segmentation, and mutual TLS to future-proof your Norwegian hosting stack before the 2018 GDPR enforcement.

The Fortress Is Dead: Implementing "Zero Trust" Architecture on Linux Infrastructure

Perimeter security is no longer sufficient. Learn how to implement a Zero Trust model using Nginx mTLS, strict SSH 2FA, and segmented networking on KVM VPS, preparing your stack for the upcoming 2018 GDPR enforcement.

The Perimeter is Dead: Implementing Zero-Trust Architecture on Linux (2017 Guide)

The traditional VPN castle-and-moat security model is obsolete. With GDPR looming, learn how to implement Google-style BeyondCorp principles using Nginx mTLS, iptables, and strict KVM isolation.

Killing the Castle: Building a Zero-Trust Infrastructure on Linux in 2017

The 'perimeter' security model is dead. With GDPR looming and ransomware evolving, reliance on a single firewall is negligence. Here is how to implement a pragmatic Zero-Trust architecture on your VPS right now.

The Death of the Perimeter: Implementing Zero-Trust Architecture in 2017

The 'castle and moat' security strategy is obsolete. With GDPR enforcement looming and sophisticated lateral attacks on the rise, Norwegian CTOs must pivot to a Zero-Trust model. Here is how to implement Google-style BeyondCorp security on your Linux infrastructure today.

Disaster Recovery for Norwegian Ops: When `rm -rf /` Happens to You

Hardware fails, and fat fingers destroy databases. In this 2017 guide, we ditch the fluff and build a battle-tested Disaster Recovery plan using MySQL 5.7 replication, lsyncd, and Norwegian data sovereignty principles.

Docker Security in 2017: Why Your Container Strategy is a Ticking Time Bomb

We analyze the Dirty COW aftermath, user namespaces in Docker 1.12, and why true KVM isolation on Norwegian soil is your only defense against shared-kernel vulnerabilities.

Disaster Recovery in 2017: Why Your "Backups" Are Not Enough

It is late 2016. The Safe Harbor framework is dead. Ransomware is evolving. Merely copying files is no longer a strategy. Here is how to architect a geo-redundant disaster recovery plan using KVM, ZFS, and Norwegian data sovereignty.

When Root Melts: A Pragmatic Disaster Recovery Strategy for Norwegian Systems (2016 Edition)

Post-Mirai botnet analysis: Why your 'backup script' isn't a Disaster Recovery Plan. We break down Master-Slave replication on Ubuntu 16.04, the legal reality of data residency in Norway, and why NVMe restores save jobs.

Zero-Trust Architecture on Linux: Hardening Your VPS Against the 'Soft Shell' Fallacy

The 'Castle and Moat' security strategy is dead. In this guide, we dismantle the perimeter and implement strict access controls, 2FA SSH, and encrypted tunnels on Ubuntu 16.04, ensuring your data in Norway remains untouchable.

Automating Infrastructure Compliance: Preparing for the GDPR Era with Ansible

With the Safe Harbor framework invalidated and new EU regulations looming, manual security hardening is a liability. Learn how to automate server compliance using Ansible on CentOS 7 to satisfy auditors and secure your Nordic infrastructure.

Zero-Trust Architecture: Why Your Firewall is a False Idol (And How to Fix It)

The 'castle and moat' security strategy is dead. Learn how to implement a Zero-Trust architecture on Linux using Nginx mTLS, hardened SSH, and strict iptables rules on your VPS.

Automating Compliance: Surviving the GDPR Shift with Infrastructure as Code

With the EU's new data protection regulations looming, manual server hardening is a liability. Learn how to automate security compliance using Ansible on strict KVM infrastructure.

Container Isolation Myths: Hardening Docker 1.12 on Production Linux Systems

Docker is not a virtualization strategy; it is a delivery mechanism. We dissect kernel namespaces, capability dropping, and why running containers on KVM-backed infrastructure is the only way to satisfy Norwegian compliance standards.

Disaster Recovery in a Post-Safe Harbor World: Architecting Resilience on Norwegian Soil

It is late 2016. Safe Harbor is dead, ransomware is rampant, and your RTO is likely a lie. Here is how to build a battle-tested Disaster Recovery plan using KVM, NVMe, and Norwegian data sovereignty.

Automating Security Compliance: A CTO’s Guide to Hardening Infrastructure in Norway (2016 Edition)

With the recent invalidation of Safe Harbor and the looming EU Data Protection Reform, manual security is a liability. Learn how to automate server hardening on CentOS 7 and Ubuntu 16.04 using Ansible to satisfy Datatilsynet requirements.

Automating Compliance: Surviving Datatilsynet with Ansible and Hardened KVM

Manual security checklists are a liability. Learn how to automate server hardening for the upcoming GDPR regulations using Ansible, OpenSCAP, and Norwegian-hosted KVM infrastructure.

Automating Compliance: Why Manual Audits Will Fail You Before GDPR Arrives

With the General Data Protection Regulation looming and Safe Harbor dead, manual security hardening is a liability. Here is how to automate server compliance using Ansible on Norwegian infrastructure.

The Perimeter is Dead: Implementing Zero-Trust Security on Your VPS in 2016

The 'Castle and Moat' security model has failed. Learn how to architect a Zero-Trust environment using strict iptables, 2FA, and segmented networks on CoolVDS infrastructure. Stop trusting your LAN.

Compliance as Code: Automating Security for the Pending GDPR Shift

With Safe Harbor dead and the GDPR clock ticking, manual server hardening is a liability. Here is how to use Ansible and OpenSCAP to enforce Norwegian compliance standards on CentOS 7.

The Perimeter is Dead: Implementing Zero Trust Architecture on Linux Infrastructure (2016 Guide)

With the recent death of Safe Harbor and the looming GDPR enforcement, the 'castle and moat' security strategy is obsolete. Here is a pragmatic guide to implementing micro-segmentation and strict access controls on your Norwegian VPS infrastructure.

Locking Down the Whale: Container Security Best Practices for Production Environments

Docker is revolutionizing deployment, but default settings are a security nightmare. We dive into kernel capabilities, user namespaces, and why KVM isolation is critical for Norwegian data integrity.

Automating the Auditor: Infrastructure Compliance in a Post-Safe Harbor World

With the recent adoption of the GDPR and the death of Safe Harbor, manual security auditing is a liability. Learn how to implement 'Compliance as Code' using OpenSCAP and Ansible on strictly isolated KVM instances.