Console Login

#["Security"

All articles tagged with ["Security"

#["Security"

Automating CIS Level 2 Compliance on Norwegian VPS: A CTO’s Guide to Surviving Datatilsynet

Manual security hardening is a liability in 2025. Learn how to automate CIS benchmarks and GDPR technical controls using OpenSCAP and Ansible on sovereign Norwegian infrastructure.

NIS2 & GDPR: Automating Security Compliance for Norwegian Infrastructure in 2025

Manual security audits are a liability. Learn how to automate CIS benchmarks, enforce GDPR compliance via code, and leverage Norwegian data sovereignty to satisfy Datatilsynet without slowing down deployment.

Automating Security Compliance: A CTO’s Guide to GDPR-Ready Infrastructure in Norway

Stop fearing Datatilsynet audits. Learn how to automate CIS benchmarks and GDPR technical safeguards using Ansible and OpenSCAP on Norwegian VPS infrastructure.

Automating Compliance: Surviving Datatilsynet Audits with Infrastructure as Code in 2025

Manual security audits are a liability. Learn how to automate GDPR compliance and CIS benchmarks using Ansible, OpenSCAP, and immutable infrastructure on Norwegian soil.

Automating Security Compliance in Norway: A CTO’s Guide to Surviving Datatilsynet Audits

Manual security audits are a liability in the post-Schrems II era. Learn how to automate CIS benchmarks and GDPR compliance checks on Norwegian VPS infrastructure using OpenSCAP and Ansible.

Automating Sovereignty: Hardening Linux Infrastructure for GDPR & CIS Compliance in 2024

Manual security audits are a liability. Learn how to automate CIS benchmarks and GDPR technical safeguards using Ansible and OpenSCAP on Norwegian soil.

Automating Server Security & GDPR Compliance: A Norwegian CTO's Playbook (2024 Edition)

Manual security audits are a liability. Learn how to automate CIS benchmarks, enforce GDPR data sovereignty in Oslo, and configure immutable infrastructure using Ansible and OpenSCAP.

Automating the GDPR Headache: Compliance as Code in a Post-May 25th World

It is July 2018. The GDPR deadline has passed, but the real work has just begun. Learn how to automate server hardening with Ansible and OpenSCAP to satisfy Datatilsynet without burning out your ops team.

Automating Security Compliance: Surviving the Year of Vulnerabilities (2014 Edition)

2014 has been brutal for sysadmins. From Heartbleed to Shellshock, manual patching is no longer an option. Learn how to automate compliance with Datatilsynet regulations and harden your Norwegian VPS infrastructure using Ansible.

Automating Server Hardening: Compliance Without the Headaches in a Post-Snowden World

Manual security checklists are a liability. Learn how to automate PCI-DSS and Datatilsynet compliance using Ansible on KVM infrastructure, keeping your data strictly within Norwegian borders.

The Death of the Perimeter: Implementing Zero Trust Architecture on Linux in 2014

The 'Castle and Moat' security strategy is dead. With Shellshock and Heartbleed exposing internal vulnerabilities, sysadmins must adopt a Zero Trust model. Here is how to lock down your Norwegian VPS infrastructure using iptables, SELinux, and 2FA.

Automating Compliance: Surviving the Datatilsynet Audit with Ansible and KVM

Manual server hardening is a liability in 2014. Learn how to automate security compliance for Norwegian standards using Ansible, IPTables, and AIDE on high-performance KVM infrastructure.

Automating Compliance: Surviving Shellshock and Datatilsynet Audits Without Losing Sleep

The Bash vulnerability (Shellshock) proved that manual security patching is dead. Here is how to automate compliance on Norwegian VPS infrastructure using Ansible and strict iptables policies, ensuring you stay on the right side of the Personal Data Act.

Automating Compliance: Surviving the Data Protection Act with Puppet and KVM

In the wake of Heartbleed, manual server hardening is professional negligence. Learn how to automate security compliance under Norwegian law using Puppet manifests and why KVM isolation is non-negotiable for sensitive data.

The Perimeter is Dead: Implementing Zero-Trust Security on Linux in a Post-Heartbleed World

The 'castle and moat' security strategy failed us. Following the 2014 Heartbleed wake-up call, we explore how to implement a Zero-Trust architecture using iptables, SELinux, and 2FA on KVM-based VPS infrastructure.

Death to the Perimeter: Architecting Zero-Trust Security on Linux

The 'Castle and Moat' security strategy is dead. Following the Heartbleed wake-up call, we explore how to implement a Zero-Trust network model on your VPS using iptables, strict SSH key management, and internal encryption. Stop trusting your LAN.

The Perimeter is Dead: Implementing a 'Zero Trust' Architecture on Linux in 2014

The 'castle and moat' security strategy is failing. In the wake of Heartbleed, we explore how to implement Forrester's Zero Trust model using IPTables, SSL mutual authentication, and strict access controls on Ubuntu 14.04 LTS.

Beyond the Perimeter: Implementing "Zero Trust" Architecture on Linux Infrastructure

The traditional "hard shell, soft center" security model is dead. Following the Heartbleed wake-up call, we explore how to implement rigorous internal segmentation and de-perimeterization on your VPS environments using standard Linux tools available in 2014.

The Perimeter is a Lie: Implementing 'Zero Trust' Architecture Post-Heartbleed

The castle-and-moat security model is dead. Following the OpenSSL Heartbleed disclosure, we explore how to architect a 'Zero Trust' environment in 2014 using strict iptables, 2FA, and segregated KVM instances in Norway.

The Perimeter is Dead: Implementing Zero-Trust Security Post-Heartbleed

Following the Heartbleed catastrophe, relying on a single firewall is professional suicide. We explore how to implement 'Zero Trust' architecture using KVM, iptables, and strict encryption on Norwegian soil.

Zero Trust in the Wake of Heartbleed: Hardening Your Norwegian VPS Infrastructure

The perimeter is dead. With the recent OpenSSL Heartbleed vulnerability exposing the fragility of 'trust', we explore implementing the Zero Trust model on Linux systems. Learn how to lock down your CoolVDS instances using KVM isolation, rigorous iptables policies, and multi-factor authentication.

Post-Heartbleed: Securing Nginx with Free SSL (StartSSL) and SPDY on CentOS 6

It has been 48 hours since CVE-2014-0160 broke the internet. Here is a battle-tested guide to patching OpenSSL, obtaining free Class 1 certificates from StartSSL, and enabling SPDY on your CoolVDS KVM instance.

Kill the Perimeter: Implementing a Zero-Trust Architecture on Linux in 2014

The traditional firewall is dead. In the wake of recent high-profile breaches, the "castle and moat" strategy is obsolete. Learn how to implement a Zero-Trust model using strict iptables, SSH hardening, and encrypted tunnels on your VPS.

Perimeter Security is Dead: Implementing Zero Trust Architecture on Linux in 2014

The firewall is no longer enough. In a post-Snowden world, we explore how to implement Forrester's Zero Trust model using iptables, OpenVPN, and KVM isolation on Norwegian infrastructure.

Automating Compliance: Hardening KVM Instances for Norwegian Data Laws

Manual security auditing is a liability. Learn how to automate server hardening with Puppet and iptables to satisfy Datatilsynet requirements while maintaining low-latency performance on Norwegian infrastructure.

Automated Compliance: Hardening RHEL/CentOS for Norwegian Data Privacy Standards

Manual server audits are a liability in 2014. Learn how to automate compliance with the Norwegian Personal Data Act using Puppet manifests, IPTables, and AIDE on true KVM infrastructure.

The Perimeter is Dead: Why Your Firewall Won't Save You (And How to Build Zero Trust)

It is 2014, and the trusted network is a myth. Learn how to implement the Forrester Zero Trust model on your VPS infrastructure using KVM isolation, iptables, and private networking.

Automating Compliance: Hardening CentOS 6 for Norwegian Data Standards

Manual security hardening is a liability in 2014. Learn how to automate server compliance using Puppet to satisfy Datatilsynet requirements and secure your infrastructure against intrusions.

Kill the Perimeter: Why "Zero Trust" is the Only Strategy for Norwegian Systems in 2013

The traditional firewall is dead. In the wake of PRISM and global surveillance, relying on perimeter security is negligence. Learn how to implement a Zero Trust architecture using iptables, SSL mutual auth, and KVM isolation on CentOS 6.

Automating Server Hardening: Meeting Norwegian Compliance Without the Headache (2013 Edition)

Manual security audits are a liability. Learn how to automate compliance with the Norwegian Personal Data Act using Puppet and standard Linux hardening techniques on high-performance KVM architecture.