Technical insights and best practices for Security & Compliance
In the wake of Heartbleed and Shellshock, the old firewall-castle model is obsolete. Learn how to lock down your infrastructure using 'Zero Trust' principles on Linux, specifically tailored for Norwegian data sovereignty.
Manual security checklists are a liability. Learn how to automate PCI-DSS and Datatilsynet compliance using Ansible on KVM infrastructure, keeping your data strictly within Norwegian borders.
The 'Castle and Moat' security strategy is dead. With Shellshock and Heartbleed exposing internal vulnerabilities, sysadmins must adopt a Zero Trust model. Here is how to lock down your Norwegian VPS infrastructure using iptables, SELinux, and 2FA.
Manual server hardening is a liability in 2014. Learn how to automate security compliance for Norwegian standards using Ansible, IPTables, and AIDE on high-performance KVM infrastructure.
Following the Heartbleed and Shellshock disasters of 2014, the traditional 'castle and moat' security model is obsolete. Learn how to implement a verify-every-packet strategy using iptables, SELinux, and Two-Factor SSH on high-performance Norwegian infrastructure.
The castle-and-moat security model failed us in 2014. From Heartbleed to Shellshock, relying on a firewall is no longer enough. Here is how to architect a Zero-Trust environment on KVM infrastructure using iptables, strict SSH hardening, and SSL everywhere.
With the Shellshock vulnerability still echoing through data centers, it is time to get serious about container isolation. We explore kernel namespaces, capability dropping, and why a KVM-backed VPS is still your best defense line.
The old model of 'trusted LAN, untrusted WAN' is obsolete. Following the chaos of Heartbleed and Shellshock, we explore how to build a manual Zero-Trust architecture using iptables, strict SSH tunneling, and KVM isolation on Norwegian infrastructure.
The Shellshock vulnerability exposed how fragile manual server management is. Learn how to use Puppet and Chef to automate security compliance, satisfy Datatilsynet requirements, and lock down your infrastructure in minutes, not days.
The Bash vulnerability (Shellshock) proved that manual security patching is dead. Here is how to automate compliance on Norwegian VPS infrastructure using Ansible and strict iptables policies, ensuring you stay on the right side of the Personal Data Act.
In the wake of Heartbleed, manual server hardening is professional negligence. Learn how to automate security compliance under Norwegian law using Puppet manifests and why KVM isolation is non-negotiable for sensitive data.
Containerization is exploding, but the shared kernel model exposes risks. We dissect namespaces, cgroups, and why wrapping your containers in a KVM VPS is the only sane choice for production.
The 'castle and moat' security strategy failed us. Following the 2014 Heartbleed wake-up call, we explore how to implement a Zero-Trust architecture using iptables, SELinux, and 2FA on KVM-based VPS infrastructure.
With the release of Docker 1.0, everyone wants to containerize. But as a sysadmin managing Norwegian infrastructure, I see gaping security holes. Here is how to lock down LXC and Docker using AppArmor, capabilities, and the right virtualization layer.
The traditional network perimeter is dead. Discover how to implement a 'Never Trust, Always Verify' security model on Linux using KVM isolation, granular iptables, and strict access controls suitable for 2014's threat landscape.
The 'Castle and Moat' security strategy is dead. Following the Heartbleed wake-up call, we explore how to implement a Zero-Trust network model on your VPS using iptables, strict SSH key management, and internal encryption. Stop trusting your LAN.
Firewalls aren't enough anymore. Following the Heartbleed wake-up call, we explore how to implement a 'Zero-Trust' architecture on Linux servers using KVM, IPTables, and 2FA. Data sovereignty in Norway has never been more critical.
The 'castle and moat' security strategy is failing. In the wake of Heartbleed, we explore how to implement Forrester's Zero Trust model using IPTables, SSL mutual authentication, and strict access controls on Ubuntu 14.04 LTS.
The traditional "hard shell, soft center" security model is dead. Following the Heartbleed wake-up call, we explore how to implement rigorous internal segmentation and de-perimeterization on your VPS environments using standard Linux tools available in 2014.
With Docker 0.11 making waves and LXC adoption growing, we dive deep into the security implications of containerization versus KVM virtualization. Learn how to harden your stack in the wake of Heartbleed.
The castle-and-moat security model is dead. Following the OpenSSL Heartbleed disclosure, we explore how to architect a 'Zero Trust' environment in 2014 using strict iptables, 2FA, and segregated KVM instances in Norway.
Following the Heartbleed catastrophe, relying on a single firewall is professional suicide. We explore how to implement 'Zero Trust' architecture using KVM, iptables, and strict encryption on Norwegian soil.
The perimeter is dead. With the recent OpenSSL Heartbleed vulnerability exposing the fragility of 'trust', we explore implementing the Zero Trust model on Linux systems. Learn how to lock down your CoolVDS instances using KVM isolation, rigorous iptables policies, and multi-factor authentication.
It has been 48 hours since CVE-2014-0160 broke the internet. Here is a battle-tested guide to patching OpenSSL, obtaining free Class 1 certificates from StartSSL, and enabling SPDY on your CoolVDS KVM instance.
The traditional firewall is dead. In the wake of recent high-profile breaches, the "castle and moat" strategy is obsolete. Learn how to implement a Zero-Trust model using strict iptables, SSH hardening, and encrypted tunnels on your VPS.
RAID is not a backup. In this deep dive, we explore disaster recovery strategies for Norwegian businesses using CentOS 6, MySQL replication, and KVM isolation. Learn how to keep your data safe from hardware failure and Datatilsynet audits.
The firewall is no longer enough. In a post-Snowden world, we explore how to implement Forrester's Zero Trust model using iptables, OpenVPN, and KVM isolation on Norwegian infrastructure.
Manual security auditing is a liability. Learn how to automate server hardening with Puppet and iptables to satisfy Datatilsynet requirements while maintaining low-latency performance on Norwegian infrastructure.
A pragmatic guide for CTOs and SysAdmins on automating server security to meet Norwegian Data Protection standards. Covers KVM isolation, iptables scripting, and the critical importance of data locality in 2014.
Manual server audits are a liability in 2014. Learn how to automate compliance with the Norwegian Personal Data Act using Puppet manifests, IPTables, and AIDE on true KVM infrastructure.