All articles tagged with datatilsynet
The 'Castle and Moat' security model is dead. Following the invalidation of Safe Harbor, relying on perimeter firewalls is negligence. Here is how to implement a Zero-Trust architecture on Linux right now using CentOS 7, OpenVPN, and the new Let's Encrypt beta.
Stop managing security with spreadsheets. We explore automating CentOS 7 hardening using Ansible to meet Datatilsynet standards, ensuring your infrastructure is as rigid as the Norwegian winter.
2014 has been brutal for sysadmins. From Heartbleed to Shellshock, manual patching is no longer an option. Learn how to automate compliance with Datatilsynet regulations and harden your Norwegian VPS infrastructure using Ansible.
The Shellshock vulnerability exposed how fragile manual server management is. Learn how to use Puppet and Chef to automate security compliance, satisfy Datatilsynet requirements, and lock down your infrastructure in minutes, not days.
The traditional "hard shell, soft center" security model is dead. Following the Heartbleed wake-up call, we explore how to implement rigorous internal segmentation and de-perimeterization on your VPS environments using standard Linux tools available in 2014.
The castle-and-moat security model is dead. Following the OpenSSL Heartbleed disclosure, we explore how to architect a 'Zero Trust' environment in 2014 using strict iptables, 2FA, and segregated KVM instances in Norway.
Manual security audits are a liability. Learn how to automate server hardening using Puppet and OSSEC on CentOS 6 to satisfy Datatilsynet requirements while maintaining peak performance on your Norwegian VPS.
Manual security audits are a liability. Learn how to automate compliance with the Norwegian Personal Data Act using Puppet and standard Linux hardening techniques on high-performance KVM architecture.
With the recent leaks regarding NSA surveillance, keeping data within Norwegian borders is no longer just compliance—it's survival. Here is how to automate server hardening using Puppet and iptables on KVM infrastructure.
Don't become a statistic. From configuring iptables to securing SSH keys, this guide covers the mandatory steps to harden your CentOS and Debian servers against modern threats. Featuring specific configurations for Norwegian compliance.
It is 2011, and the script kiddies are winning. Learn how to lock down your CentOS 6 or Debian Squeeze server using iptables, SSH keys, and proper KVM isolation before you become the next LulzSec statistic.
Stop relying on 'security through obscurity'. From configuring rigid iptables to navigating Norwegian privacy laws, this guide covers the mandatory steps to secure your VPS against modern botnets and brute-force attacks.
It is 2011, and the 'Cloud' buzzword is everywhere. But for systems architects, the reality is often high I/O wait and unpredictable performance. We explore why local RAID 10 storage beats centralized SANs and how to tune your Linux stack for speed.
Botnets don't sleep. Secure your CentOS and Ubuntu servers with these battle-tested hardening techniques. From iptables to SSH keys, here is how to keep your data safe in compliance with Datatilsynet standards.
Shared hosting is a liability. Discover why businesses are migrating to Xen and KVM virtualization, how to optimize MySQL 5.1 for heavy loads, and why latency to NIX (Oslo) matters more than raw bandwidth.
Is your site crashing under the 'Slashdot Effect'? We analyze the architectural bottlenecks of shared hosting environments versus the dedicated isolation of Xen-based VPS, with a focus on latency optimization in the Nordic region.
Secure your Linux box against the rising tide of botnets. A battle-hardened guide to SSH keys, iptables, and complying with Norwegian data laws without sacrificing performance.
Stop letting "noisy neighbors" crash your site. We analyze the kernel-level differences between shared environments and Xen-based VPS, and why high-traffic Norwegian sites need dedicated resources in 2010.
Shared hosting is a ticking time bomb for growing businesses. We break down why Xen virtualization, RAID-10 SAS storage, and NIX peering are non-negotiable for stability in 2009.