Console Login

#datatilsynet

All articles tagged with datatilsynet

#datatilsynet

Kill the Perimeter: Implementing Zero-Trust on Linux in Post-Safe Harbor Europe

The 'Castle and Moat' security model is dead. Following the invalidation of Safe Harbor, relying on perimeter firewalls is negligence. Here is how to implement a Zero-Trust architecture on Linux right now using CentOS 7, OpenVPN, and the new Let's Encrypt beta.

Server Hardening & Compliance: Automating Security for the Norwegian Cloud

Stop managing security with spreadsheets. We explore automating CentOS 7 hardening using Ansible to meet Datatilsynet standards, ensuring your infrastructure is as rigid as the Norwegian winter.

Automating Security Compliance: Surviving the Year of Vulnerabilities (2014 Edition)

2014 has been brutal for sysadmins. From Heartbleed to Shellshock, manual patching is no longer an option. Learn how to automate compliance with Datatilsynet regulations and harden your Norwegian VPS infrastructure using Ansible.

Surviving Shellshock: Automating Security Compliance for Norwegian Enterprise Infrastructure

The Shellshock vulnerability exposed how fragile manual server management is. Learn how to use Puppet and Chef to automate security compliance, satisfy Datatilsynet requirements, and lock down your infrastructure in minutes, not days.

Beyond the Perimeter: Implementing "Zero Trust" Architecture on Linux Infrastructure

The traditional "hard shell, soft center" security model is dead. Following the Heartbleed wake-up call, we explore how to implement rigorous internal segmentation and de-perimeterization on your VPS environments using standard Linux tools available in 2014.

The Perimeter is a Lie: Implementing 'Zero Trust' Architecture Post-Heartbleed

The castle-and-moat security model is dead. Following the OpenSSL Heartbleed disclosure, we explore how to architect a 'Zero Trust' environment in 2014 using strict iptables, 2FA, and segregated KVM instances in Norway.

Automating Security Compliance: From 'Personopplysningsloven' to PCI-DSS on Linux

Manual security audits are a liability. Learn how to automate server hardening using Puppet and OSSEC on CentOS 6 to satisfy Datatilsynet requirements while maintaining peak performance on your Norwegian VPS.

Automating Server Hardening: Meeting Norwegian Compliance Without the Headache (2013 Edition)

Manual security audits are a liability. Learn how to automate compliance with the Norwegian Personal Data Act using Puppet and standard Linux hardening techniques on high-performance KVM architecture.

Surviving the Audit: Automating Server Security and Compliance in a Post-PRISM World

With the recent leaks regarding NSA surveillance, keeping data within Norwegian borders is no longer just compliance—it's survival. Here is how to automate server hardening using Puppet and iptables on KVM infrastructure.

Lock It Down: The Essential Guide to Hardening Linux Servers in 2012

Don't become a statistic. From configuring iptables to securing SSH keys, this guide covers the mandatory steps to harden your CentOS and Debian servers against modern threats. Featuring specific configurations for Norwegian compliance.

Linux Server Hardening: Survival Guide for the Paranoid SysAdmin (2011 Edition)

It is 2011, and the script kiddies are winning. Learn how to lock down your CentOS 6 or Debian Squeeze server using iptables, SSH keys, and proper KVM isolation before you become the next LulzSec statistic.

Fortress Norway: The Definitive Linux Server Hardening Guide (2011 Edition)

Stop relying on 'security through obscurity'. From configuring rigid iptables to navigating Norwegian privacy laws, this guide covers the mandatory steps to secure your VPS against modern botnets and brute-force attacks.

Cloud Storage in 2011: Why Latency and Shared SANs Are Killing Your Web App

It is 2011, and the 'Cloud' buzzword is everywhere. But for systems architects, the reality is often high I/O wait and unpredictable performance. We explore why local RAID 10 storage beats centralized SANs and how to tune your Linux stack for speed.

Linux Server Hardening: Essential Security Steps for Norwegian Systems (2010 Edition)

Botnets don't sleep. Secure your CentOS and Ubuntu servers with these battle-tested hardening techniques. From iptables to SSH keys, here is how to keep your data safe in compliance with Datatilsynet standards.

Stop Letting IOwait Kill Your Business: The Sysadmin’s Guide to VPS Selection in 2010

Shared hosting is a liability. Discover why businesses are migrating to Xen and KVM virtualization, how to optimize MySQL 5.1 for heavy loads, and why latency to NIX (Oslo) matters more than raw bandwidth.

Stop Sharing Your CPU: Why Serious Norwegian Developers Are Ditching Shared Hosting for VPS

Is your site crashing under the 'Slashdot Effect'? We analyze the architectural bottlenecks of shared hosting environments versus the dedicated isolation of Xen-based VPS, with a focus on latency optimization in the Nordic region.

Linux Server Hardening: The 2010 Survival Guide for Norwegian Sysadmins

Secure your Linux box against the rising tide of botnets. A battle-hardened guide to SSH keys, iptables, and complying with Norwegian data laws without sacrificing performance.

The "Unlimited" Trap: Why Shared Hosting Fails and When to Move to a VPS

Stop letting "noisy neighbors" crash your site. We analyze the kernel-level differences between shared environments and Xen-based VPS, and why high-traffic Norwegian sites need dedicated resources in 2010.

Latency Kills Revenue: Why Serious Norwegian Enterprises Are Moving to Xen VDS

Shared hosting is a ticking time bomb for growing businesses. We break down why Xen virtualization, RAID-10 SAS storage, and NIX peering are non-negotiable for stability in 2009.