Technical insights and best practices for Security & Compliance
Hardware fails. It is a mathematical certainty. In 2014, relying solely on RAID is professional negligence. We dissect the difference between redundancy and recovery, explore robust rsync strategies, and explain why keeping your data inside Norway borders (Datatilsynet) is your best legal defense.
It is 2014, and the trusted network is a myth. Learn how to implement the Forrester Zero Trust model on your VPS infrastructure using KVM isolation, iptables, and private networking.
Manual security hardening is a liability in 2014. Learn how to automate server compliance using Puppet to satisfy Datatilsynet requirements and secure your infrastructure against intrusions.
While the buzz around Docker and lightweight virtualization grows, the security implications of shared kernels remain a massive blind spot. We dive deep into hardening LXC, managing cgroups, and why KVM isolation is the superior choice for Norwegian data sovereignty.
The traditional firewall is dead. In the wake of PRISM and global surveillance, relying on perimeter security is negligence. Learn how to implement a Zero Trust architecture using iptables, SSL mutual auth, and KVM isolation on CentOS 6.
Manual security audits are a liability. Learn how to automate server hardening using Puppet and OSSEC on CentOS 6 to satisfy Datatilsynet requirements while maintaining peak performance on your Norwegian VPS.
The 'castle and moat' security model is dead. Learn how to secure your Norwegian VPS infrastructure using iptables, OpenVPN, and 2FA, treating your internal LAN with the same suspicion as the public internet.
The perimeter is dead. Following the recent Snowden leaks, relying on firewalls alone is negligence. Learn how to implement a Zero-Trust model using KVM, OpenVPN, and aggressive iptables rules to secure your Norwegian VPS.
Container virtualization offers speed, but default configurations leave you wide open. We dive into capability dropping, cgroups resource control, and why KVM isolation is the ultimate security layer for Norwegian mission-critical data.
It is 2013, and Linux Containers (LXC) are exploding in popularity. But shared kernels mean shared risks. We explore capability dropping, cgroups, and why KVM remains the isolation king for Norwegian enterprise data.
Manual security audits are a liability. Learn how to automate compliance with the Norwegian Personal Data Act using Puppet and standard Linux hardening techniques on high-performance KVM architecture.
With the recent leaks regarding NSA surveillance, keeping data within Norwegian borders is no longer just complianceβit's survival. Here is how to automate server hardening using Puppet and iptables on KVM infrastructure.
Container virtualization (LXC/OpenVZ) offers speed, but shared kernels invite disaster. Learn how to harden your isolation, drop kernel capabilities, and why KVM might be the safer bet for critical Norwegian workloads.
Stop relying on manual checklists for server security. Learn how to automate compliance with Puppet and shell scripting to satisfy Datatilsynet requirements while keeping your sanity intact.
The traditional perimeter is dead. Discover how to harden your infrastructure by assuming every network interface is hostile, using iptables, SSH keys, and SSL everywhere on CoolVDS KVM instances.
Hardware fails. RAID controllers degrade. In this guide, we bypass the marketing fluff and deploy a battle-tested Disaster Recovery plan using MySQL replication, Rsync, and Norwegian infrastructure laws.
Container virtualization offers raw speed, but shared kernels pose significant security risks. Learn how to lock down LXC and OpenVZ environments using cgroups, capabilities, and network isolation.
The traditional 'castle and moat' security strategy is failing. Learn how to implement Forrester's Zero Trust model using iptables, SSL, and rigorous access controls on your Norwegian VPS infrastructure.
Container virtualization is lightweight but risky. Learn how to lock down LXC and OpenVZ environments against root escalation and resource exhaustion using cgroups, iptables, and the new Kernel 3.8 user namespaces.
The 'crunchy shell, soft center' security model is dead. Learn how to implement a Zero-Trust architecture on your VPS using iptables, SSL everywhere, and Norwegian privacy standards. No firewalls between you and the truth.
It is 2013, and everyone wants lightweight virtualization. But running root inside a container often means root on the host. Here is how to secure LXC against kernel exploits and noisy neighbors before you deploy to production.
Perimeter firewalls are no longer enough. Learn how to implement John Kindervag's Zero Trust model using IPTables, OpenVPN, and hardened SSH configurations on Ubuntu 12.04 and CentOS 6.
The era of the trusted internal network is ending. In 2013, relying solely on a perimeter firewall is negligence. Learn how to implement defense-in-depth using iptables, SSL, and rigorous access control to secure your Norwegian VPS against sophisticated threats.
A pragmatic guide for CTOs on navigating EU Directive 95/46/EC and the Norwegian Personal Data Act using Puppet, IPTables, and KVM isolation in 2013.
Container virtualization offers incredible density, but the shared kernel model exposes significant attack surfaces. We dive into manual cgroup limits, iptables isolation, and why KVM is still king for sensitive data under Norwegian privacy laws.
The traditional perimeter firewall is dead. Learn how to architect a 'Zero Trust' infrastructure on KVM VPS using IPTables, OpenVPN, and strict access controlsβassuming your local network is already compromised.
A battle-hardened guide to securing your Linux VPS against modern threats. We cover SSH keys, IPTables strategies, and why kernel isolation matters for compliance in Norway.
Stop sending passwords in cleartext. Learn how to configure a chrooted SFTP environment on CentOS 6 and Ubuntu 12.04 to comply with Norwegian privacy standards.
It is 2012. Sending passwords over port 21 is professional negligence. Learn how to configure a chrooted SFTP environment using OpenSSH's internal-sftp subsystem to satisfy Datatilsynet requirements and secure your infrastructure.
A battle-tested guide to securing your CentOS 6 and Debian 6 servers. From iptables to SSH keys, learn how to protect your infrastructure against rising botnets while leveraging Norwegian privacy standards.