Technical insights and best practices for Security & Compliance
Manual security audits are a liability in 2022. Learn how to automate CIS benchmarks and GDPR compliance checks on Linux infrastructure using OpenSCAP and Ansible, ensuring your data stays secure within Norwegian borders.
Manual security audits are a liability in the post-Schrems II era. Learn how to automate CIS Level 2 hardening on AlmaLinux 8 using OpenSCAP and Ansible, while ensuring true data sovereignty on Norwegian soil.
The 'castle-and-moat' security model is obsolete. Learn how to implement actionable Zero-Trust principles on Linux infrastructure using WireGuard, mTLS, and compliant Norwegian hosting to satisfy Datatilsynet.
Perimeter security is dead. Learn how to implement a pragmatic Zero-Trust model using WireGuard, Nginx mTLS, and Norwegian data sovereignty to satisfy Datatilsynet and secure your infrastructure.
A technical deep-dive into building compliant, resilient disaster recovery architectures in Norway. From Schrems II compliance to immutable backups with Borg and ZFS.
Stop treating compliance as a PDF checklist. In the post-Schrems II era, we explore how to automate CIS benchmarks, enforce sovereignty, and secure your Nordic infrastructure using Ansible, OpenSCAP, and KVM isolation.
With the Austrian DSB declaring Google Analytics illegal in early 2022, reliance on US hyperscalers is now a liability. Here is how to automate strict compliance on sovereign Norwegian infrastructure using OpenSCAP and Ansible.
A pragmatic CTO's guide to building a legally compliant disaster recovery plan in Norway. We analyze RTO/RPO strategies, Schrems II implications, and technical implementations using immutable backups.
Manual server hardening is a liability. Learn how to automate CIS benchmarks and GDPR technical controls using Ansible and OpenSCAP on Norwegian infrastructure.
Manual security audits are a liability. Learn how to automate CIS benchmarks and GDPR compliance checks using OpenSCAP and Ansible on Norwegian infrastructure.
The perimeter is dead. After the Log4j nightmare, relying on firewalls is negligence. Learn how to implement Zero-Trust principles using WireGuard, mTLS, and nftables on Norwegian infrastructure.
The 'Log4Shell' vulnerability exposed the fragility of default container configurations. This guide details strictly technical hardening strategies—from kernel capabilities to network isolation—ensuring your Norwegian infrastructure survives the next zero-day.
Manual server hardening is a liability in 2021. Learn how to automate CIS-level security on Norwegian VPS infrastructure using Ansible and OpenSCAP to satisfy Datatilsynet and GDPR requirements without sacrificing velocity.
It is December 2021, and the internet is on fire. Here is a battle-tested guide to locking down Docker and Kubernetes, ensuring valid isolation, and why running containers on shared-kernel VPS is a ticking time bomb.
Perimeter security is dead. Learn how to implement a Zero-Trust network using WireGuard, mTLS, and KVM isolation on Norwegian soil to satisfy Datatilsynet and secure your stack.
Move beyond the perimeter. Learn how to implement a Zero-Trust security model using mTLS, Kubernetes NetworkPolicies, and strict infrastructure isolation compliant with Schrems II.
Manual security audits are a liability in 2021. Learn how to automate CIS benchmarks and GDPR technical safeguards using OpenSCAP and Ansible on sovereign Norwegian infrastructure.
The 'castle-and-moat' security strategy failed us. Here is how to architect a true Zero-Trust environment using WireGuard, SSH keys, and strict kernel-level isolation, compliant with Norway's strict data standards.
Perimeter security is obsolete. In the wake of Schrems II, moving to a Zero Trust model isn't just about security—it's about compliance. Here is the pragmatic roadmap for implementation on Linux infrastructure.
Hope is not a strategy. We dissect a battle-tested 3-2-1 backup architecture using WireGuard, BorgBackup, and Norwegian NVMe infrastructure to keep your RTO under 15 minutes.
Stop running containers as root. A battle-hardened guide to immutable infrastructure, network policies, and why the underlying VPS architecture dictates your security posture in the post-Schrems II era.
Manual security audits are a liability. Learn how to automate CIS benchmarks and GDPR compliance checks using OpenSCAP and Ansible on Norwegian infrastructure.
Perimeter security is dead. Learn how to implement a true Zero-Trust model using mTLS, nftables, and WireGuard on Linux, ensuring compliance with Norway's strict data sovereignty laws.
Stop trusting default configurations. From non-root users to immutable infrastructure, here is the battle-tested guide to securing your container workloads in the post-Schrems II era.
Manual security audits are a liability in 2021. Learn how to automate CIS benchmarks and guarantee data residency in Norway using Ansible, OpenSCAP, and local infrastructure.
Manual security hardening is a liability. Learn how to automate CIS benchmarks on Ubuntu 20.04, navigate the post-Schrems II legal landscape in Norway, and enforce drift detection without drowning in paperwork.
Disaster recovery isn't just about backups anymore; it's about data sovereignty and survival. We explore architecting resilient infrastructure in Norway following the 2021 datacenter incidents.
Perimeter security is obsolete. Learn how to architect a Zero Trust environment using WireGuard, SSH Certificates, and Norwegian data sovereignty principles to satisfy Schrems II and secure your infrastructure.
The castle-and-moat security model is dead. In the wake of SolarWinds and Schrems II, we dismantle traditional VPNs and implement a true Zero-Trust model using WireGuard, mTLS, and KVM-isolated infrastructure in Norway.
Containers are not virtual machines. Learn how to lock down your Docker runtime, survive Schrems II compliance in Norway, and why running as root is a death sentence for your infrastructure.