Console Login

Security & Compliance Articles

Technical insights and best practices for Security & Compliance

Security & Compliance

Automating Server Hardening on Ubuntu 16.04: A Guide for Nordic Systems

Ubuntu 16.04 LTS 'Xenial Xerus' has just landed. Here is how to automate your security compliance workflow using Ansible and OpenSCAP to prepare for the newly adopted GDPR framework.

The Perimeter is Dead: Implementing Zero-Trust Architecture on Linux (2016 Edition)

The 'castle and moat' security model failed Target and OPM. It will fail you. Learn how to implement the Google BeyondCorp philosophy using Nginx, OpenVPN, and iptables on Norwegian infrastructure.

The Perimeter is Dead: Implementing Zero-Trust Security on Linux in 2016

Stop relying on firewalls alone. Learn how to build a Zero-Trust architecture using Nginx mTLS, SSH hardening, and strict segmentation on Norwegian infrastructure.

Surviving the Post-Safe Harbor World: Automating Security Compliance in Norway

With the invalidation of Safe Harbor, data sovereignty is no longer optional. Learn how to automate server hardening with Ansible and keep the Norwegian Data Protection Authority happy.

The Perimeter is Dead: Implementing a Zero-Trust Architecture in 2016 Post-Safe Harbor

With the recent collapse of the Safe Harbor agreement, relying on a simple firewall is no longer sufficient. Learn how to implement Google's 'Zero Trust' model using Linux primitives, strict access controls, and Norwegian infrastructure.

Kill the Perimeter: Implementing Zero-Trust on Linux in Post-Safe Harbor Europe

The 'Castle and Moat' security model is dead. Following the invalidation of Safe Harbor, relying on perimeter firewalls is negligence. Here is how to implement a Zero-Trust architecture on Linux right now using CentOS 7, OpenVPN, and the new Let's Encrypt beta.

Zero-Trust Infrastructure: Why Your Firewall is Lying to You (and How to Fix It)

The 'hard shell, soft center' security model is obsolete. Following the Safe Harbor collapse, we explore implementing Zero-Trust principles on Linux systems using KVM isolation, strict iptables chains, and 2FA—because the threat is already inside.

Automating Compliance: Surviving the Post-Safe Harbor Fallout in Norway

With the invalidation of Safe Harbor, hosting data in Norway is no longer just a preference—it's a necessity. Learn how to automate security baselines using Ansible and OpenSCAP to satisfy Datatilsynet without burning out your sysadmins.

Automating Security Compliance: Surviving the Safe Harbor Fallout with Norwegian Infrastructure

With the invalidation of Safe Harbor, relying on US-based clouds is a legal gamble. Learn how to automate server hardening with Ansible and OpenSCAP to satisfy Datatilsynet requirements while ensuring high-performance hosting in Norway.

Post-Safe Harbor Reality: Automating Security Compliance for Norwegian Infrastructure

With the EU-US Safe Harbor framework invalidated, Norwegian CTOs face a compliance crisis. Learn how to automate server hardening using Ansible to satisfy Datatilsynet requirements while keeping data strictly on Norwegian soil.

The Perimeter is Dead: Implementing Zero-Trust Security on Your VPS After the Safe Harbor Collapse

With the EU-US Safe Harbor agreement invalidated today, the 'castle and moat' security strategy is obsolete. Learn how to implement a Zero-Trust architecture using iptables, OpenVPN, and KVM isolation on Norwegian soil.

Automating Server Hardening: Compliance Strategies for Norwegian CTOs (2015 Edition)

With the Safe Harbor framework crumbling and Datatilsynet watching, manual security is a liability. Learn how to automate compliance using Ansible and KVM isolation on CoolVDS.

Automating Compliance: Why Manual Hardening is Killing Your Audit Strategy

With the Safe Harbor framework crumbling, relying on manual server hardening is a liability. Learn how to automate security compliance on Norwegian infrastructure using Ansible 1.9.

Container Security in 2015: Stop Handing Root Access to Your Host

Docker is revolutionizing deployment, but default configurations are a security nightmare. Learn how to harden your containers, drop kernel capabilities, and why running Docker on KVM-based infrastructure like CoolVDS is the only sane choice for production in Norway.

Server Hardening & Compliance: Automating Security for the Norwegian Cloud

Stop managing security with spreadsheets. We explore automating CentOS 7 hardening using Ansible to meet Datatilsynet standards, ensuring your infrastructure is as rigid as the Norwegian winter.

The Perimeter is Dead: Implementing Zero-Trust Security in 2015

The 'castle and moat' security strategy is failing. We explore how to implement Google's BeyondCorp-style Zero-Trust architecture using KVM, SSH keys, and rigorous segmentation on Norwegian infrastructure.

Automating Security Baselines: Why Manual Hardening is a Liability in 2015

Manual server hardening is a critical risk. Learn how to automate security baselines using Ansible on CentOS 7, ensure compliance with Datatilsynet guidelines, and why data sovereignty in Norway is your best defense against the crumbling Safe Harbor framework.

Automating Compliance: Infrastructure as Code & Data Sovereignty in Norway

In 2015, manual server hardening is a liability. Learn how to automate security baselines using Ansible 1.9 and why keeping data on Norwegian soil is the smartest move for your risk profile.

Automating Security Compliance: Why Manual Hardening is Killing Your Audit Trail

In 2015, managing server security via spreadsheets is negligence. We explore how to replace manual checklists with Ansible and OpenSCAP on Norwegian infrastructure to satisfy Datatilsynet and PCI-DSS requirements.

The Perimeter is Dead: Building a "Zero Trust" Infrastructure on Linux in 2015

The old "hard shell, soft center" security model is obsolete. Learn how to implement Google-style Zero Trust principles using KVM, iptables, and SSH hardening to protect your Norwegian VPS assets.

When the Fjord Freezes Over: Disaster Recovery Strategies for Norwegian Infrastructure

It is not a matter of if your server will fail, but when. We dissect practical Disaster Recovery strategies for 2015, from MySQL replication to complying with Datatilsynet, ensuring your data survives the worst.

Automating Server Hardening: A CTO’s Guide to Compliance in Norway (2015 Edition)

Manual security audits are a liability. Learn how to automate compliance using OpenSCAP and Ansible on CentOS 7, ensuring your infrastructure meets Datatilsynet standards while keeping data strictly within Norwegian borders.

Automating Security Compliance: Surviving Datatilsynet Audits in 2015

Manual security hardening is a liability. Learn how to automate server compliance under the Norwegian Personal Data Act using Ansible and OpenSCAP, and why sovereign infrastructure matters more than ever.

Perimeter Security is Dead: Building a Zero-Trust Architecture on Linux VPS

The castle-and-moat security model failed Sony and Anthem. It will fail you. Learn how to implement a Zero-Trust network using strict iptables, internal SSL, and 2FA on CentOS 7 and Ubuntu 14.04.

Automating Server Hardening: A CTO’s Guide to Surviving Datatilsynet without Ulcers

Manual security checklists are a liability. Learn how to automate compliance using Ansible and OpenSCAP on KVM infrastructure, keeping your data strictly within Norwegian jurisdiction.

The Perimeter is Dead: Architecting 'Zero Trust' Security on Linux in 2015

The 'Castle and Moat' security strategy is failing. Learn how to implement a Zero Trust architecture today using KVM, strict IPTables, and Two-Factor Authentication to secure your Norwegian infrastructure against modern threats.

Automating Compliance: How to harden your Norwegian VPS without losing your mind

Manual security audits are a liability in 2015. Learn how to use Ansible and KVM isolation to satisfy Datatilsynet and sleep better at night.

Automating Security Compliance: Surviving the Year of Vulnerabilities (2014 Edition)

2014 has been brutal for sysadmins. From Heartbleed to Shellshock, manual patching is no longer an option. Learn how to automate compliance with Datatilsynet regulations and harden your Norwegian VPS infrastructure using Ansible.

Container Security in 2014: Why Your Docker Strategy Might Be Dangerous

Docker is exploding in popularity, but standard configurations leave gaping security holes. We explore kernel isolation, Shellshock mitigation, and why running containers on KVM-based VPS is critical for Norwegian data compliance.

Docker in Production: Taming the Security Beast Before It Bites

Containerization is revolutionizing deployment, but the security model in 2014 is still the Wild West. From Shellshock mitigation to kernel namespaces, here is how to run Docker securely on Norwegian infrastructure without exposing root.