Console Login

Security & Compliance Articles

Technical insights and best practices for Security & Compliance

Security & Compliance

The Perimeter is Dead: Implementing Zero Trust Architecture on Linux Systems

In the wake of Heartbleed and Shellshock, the old firewall-castle model is obsolete. Learn how to lock down your infrastructure using 'Zero Trust' principles on Linux, specifically tailored for Norwegian data sovereignty.

Automating Server Hardening: Compliance Without the Headaches in a Post-Snowden World

Manual security checklists are a liability. Learn how to automate PCI-DSS and Datatilsynet compliance using Ansible on KVM infrastructure, keeping your data strictly within Norwegian borders.

The Death of the Perimeter: Implementing Zero Trust Architecture on Linux in 2014

The 'Castle and Moat' security strategy is dead. With Shellshock and Heartbleed exposing internal vulnerabilities, sysadmins must adopt a Zero Trust model. Here is how to lock down your Norwegian VPS infrastructure using iptables, SELinux, and 2FA.

Automating Compliance: Surviving the Datatilsynet Audit with Ansible and KVM

Manual server hardening is a liability in 2014. Learn how to automate security compliance for Norwegian standards using Ansible, IPTables, and AIDE on high-performance KVM infrastructure.

The Perimeter is Dead: Implementing "Zero Trust" Architecture on Linux Systems (Post-Shellshock Edition)

Following the Heartbleed and Shellshock disasters of 2014, the traditional 'castle and moat' security model is obsolete. Learn how to implement a verify-every-packet strategy using iptables, SELinux, and Two-Factor SSH on high-performance Norwegian infrastructure.

Perimeter Security is Dead: Implementing Zero-Trust on Linux in the Wake of Shellshock

The castle-and-moat security model failed us in 2014. From Heartbleed to Shellshock, relying on a firewall is no longer enough. Here is how to architect a Zero-Trust environment on KVM infrastructure using iptables, strict SSH hardening, and SSL everywhere.

Docker in Production: Stop Treating Containers Like Lightweight VMs

With the Shellshock vulnerability still echoing through data centers, it is time to get serious about container isolation. We explore kernel namespaces, capability dropping, and why a KVM-backed VPS is still your best defense line.

The Perimeter is Dead: Implementing "Trust No One" Security on Linux in the Wake of Shellshock

The old model of 'trusted LAN, untrusted WAN' is obsolete. Following the chaos of Heartbleed and Shellshock, we explore how to build a manual Zero-Trust architecture using iptables, strict SSH tunneling, and KVM isolation on Norwegian infrastructure.

Surviving Shellshock: Automating Security Compliance for Norwegian Enterprise Infrastructure

The Shellshock vulnerability exposed how fragile manual server management is. Learn how to use Puppet and Chef to automate security compliance, satisfy Datatilsynet requirements, and lock down your infrastructure in minutes, not days.

Automating Compliance: Surviving Shellshock and Datatilsynet Audits Without Losing Sleep

The Bash vulnerability (Shellshock) proved that manual security patching is dead. Here is how to automate compliance on Norwegian VPS infrastructure using Ansible and strict iptables policies, ensuring you stay on the right side of the Personal Data Act.

Automating Compliance: Surviving the Data Protection Act with Puppet and KVM

In the wake of Heartbleed, manual server hardening is professional negligence. Learn how to automate security compliance under Norwegian law using Puppet manifests and why KVM isolation is non-negotiable for sensitive data.

LXC & Docker Security in 2014: Don't Let Your Container Break Out

Containerization is exploding, but the shared kernel model exposes risks. We dissect namespaces, cgroups, and why wrapping your containers in a KVM VPS is the only sane choice for production.

The Perimeter is Dead: Implementing Zero-Trust Security on Linux in a Post-Heartbleed World

The 'castle and moat' security strategy failed us. Following the 2014 Heartbleed wake-up call, we explore how to implement a Zero-Trust architecture using iptables, SELinux, and 2FA on KVM-based VPS infrastructure.

Container Security in 2014: Why Shared Kernels Keep Me Up at Night (And How to Fix It)

With the release of Docker 1.0, everyone wants to containerize. But as a sysadmin managing Norwegian infrastructure, I see gaping security holes. Here is how to lock down LXC and Docker using AppArmor, capabilities, and the right virtualization layer.

Zero Trust Architecture: Securing Linux Servers in a Post-Snowden Era

The traditional network perimeter is dead. Discover how to implement a 'Never Trust, Always Verify' security model on Linux using KVM isolation, granular iptables, and strict access controls suitable for 2014's threat landscape.

Death to the Perimeter: Architecting Zero-Trust Security on Linux

The 'Castle and Moat' security strategy is dead. Following the Heartbleed wake-up call, we explore how to implement a Zero-Trust network model on your VPS using iptables, strict SSH key management, and internal encryption. Stop trusting your LAN.

The Perimeter is Dead: Implementing Zero-Trust Security on Your VPS in a Post-Snowden World

Firewalls aren't enough anymore. Following the Heartbleed wake-up call, we explore how to implement a 'Zero-Trust' architecture on Linux servers using KVM, IPTables, and 2FA. Data sovereignty in Norway has never been more critical.

The Perimeter is Dead: Implementing a 'Zero Trust' Architecture on Linux in 2014

The 'castle and moat' security strategy is failing. In the wake of Heartbleed, we explore how to implement Forrester's Zero Trust model using IPTables, SSL mutual authentication, and strict access controls on Ubuntu 14.04 LTS.

Beyond the Perimeter: Implementing "Zero Trust" Architecture on Linux Infrastructure

The traditional "hard shell, soft center" security model is dead. Following the Heartbleed wake-up call, we explore how to implement rigorous internal segmentation and de-perimeterization on your VPS environments using standard Linux tools available in 2014.

Container Security in 2014: Why Shared Kernels Keep Me Awake at Night

With Docker 0.11 making waves and LXC adoption growing, we dive deep into the security implications of containerization versus KVM virtualization. Learn how to harden your stack in the wake of Heartbleed.

The Perimeter is a Lie: Implementing 'Zero Trust' Architecture Post-Heartbleed

The castle-and-moat security model is dead. Following the OpenSSL Heartbleed disclosure, we explore how to architect a 'Zero Trust' environment in 2014 using strict iptables, 2FA, and segregated KVM instances in Norway.

The Perimeter is Dead: Implementing Zero-Trust Security Post-Heartbleed

Following the Heartbleed catastrophe, relying on a single firewall is professional suicide. We explore how to implement 'Zero Trust' architecture using KVM, iptables, and strict encryption on Norwegian soil.

Zero Trust in the Wake of Heartbleed: Hardening Your Norwegian VPS Infrastructure

The perimeter is dead. With the recent OpenSSL Heartbleed vulnerability exposing the fragility of 'trust', we explore implementing the Zero Trust model on Linux systems. Learn how to lock down your CoolVDS instances using KVM isolation, rigorous iptables policies, and multi-factor authentication.

Post-Heartbleed: Securing Nginx with Free SSL (StartSSL) and SPDY on CentOS 6

It has been 48 hours since CVE-2014-0160 broke the internet. Here is a battle-tested guide to patching OpenSSL, obtaining free Class 1 certificates from StartSSL, and enabling SPDY on your CoolVDS KVM instance.

Kill the Perimeter: Implementing a Zero-Trust Architecture on Linux in 2014

The traditional firewall is dead. In the wake of recent high-profile breaches, the "castle and moat" strategy is obsolete. Learn how to implement a Zero-Trust model using strict iptables, SSH hardening, and encrypted tunnels on your VPS.

Surviving the Meltdown: A Battle-Hardened Sysadmin’s Guide to Disaster Recovery in Norway (2014 Edition)

RAID is not a backup. In this deep dive, we explore disaster recovery strategies for Norwegian businesses using CentOS 6, MySQL replication, and KVM isolation. Learn how to keep your data safe from hardware failure and Datatilsynet audits.

Perimeter Security is Dead: Implementing Zero Trust Architecture on Linux in 2014

The firewall is no longer enough. In a post-Snowden world, we explore how to implement Forrester's Zero Trust model using iptables, OpenVPN, and KVM isolation on Norwegian infrastructure.

Automating Compliance: Hardening KVM Instances for Norwegian Data Laws

Manual security auditing is a liability. Learn how to automate server hardening with Puppet and iptables to satisfy Datatilsynet requirements while maintaining low-latency performance on Norwegian infrastructure.

Automating Compliance: Server Hardening and Sovereignty in Post-Snowden Norway

A pragmatic guide for CTOs and SysAdmins on automating server security to meet Norwegian Data Protection standards. Covers KVM isolation, iptables scripting, and the critical importance of data locality in 2014.

Automated Compliance: Hardening RHEL/CentOS for Norwegian Data Privacy Standards

Manual server audits are a liability in 2014. Learn how to automate compliance with the Norwegian Personal Data Act using Puppet manifests, IPTables, and AIDE on true KVM infrastructure.