Console Login

#Security & Compliance

All articles tagged with Security & Compliance

#Security & Compliance

Disaster Recovery Architectures for 2025: Beyond the 3-2-1 Rule in the Norwegian Cloud

A battle-hardened guide to surviving ransomware and fiber cuts. We explore immutable backups, automated failover using Terraform, and why data sovereignty in Norway is no longer optional.

Automating GDPR Compliance: A CTO's Survival Guide for Norwegian Infrastructure

Manual security audits are a liability. Learn how to automate CIS benchmarks and GDPR compliance checks using Ansible and OpenSCAP on Norwegian VPS infrastructure.

Zero-Trust Architecture in 2023: Implementing Micro-Segmentation on Norwegian Infrastructure

The 'castle and moat' security model is dead. Learn how to implement a true Zero-Trust strategy using mTLS, WireGuard, and strict KVM isolation compliant with Datatilsynet standards.

Container Security in 2023: Stop Running as Root and Start Locking Down

Most container deployments are dangerously open. From dropping capabilities to navigating Norwegian compliance (Schrems II), this guide covers the hardening techniques that actually matter.

Zero-Trust Architecture: Why Your VPN Is a Liability in Post-Schrems II Norway

Perimeter security is dead. Learn how to implement a pragmatic Zero-Trust model using WireGuard, Nginx mTLS, and Norwegian data sovereignty to satisfy Datatilsynet and secure your infrastructure.

Zero Trust is Not a Product, It's a Survival Strategy: Implementing BeyondCorp Principles in the Norwegian Cloud

Perimeter security is obsolete. Learn how to architect a Zero Trust environment using WireGuard, SSH Certificates, and Norwegian data sovereignty principles to satisfy Schrems II and secure your infrastructure.

Zero-Trust Architecture in a Post-Schrems II World: Implementing Identity-Aware Infrastructure on Linux

The 'Castle and Moat' security model is dead. Following the July 2020 Schrems II ruling, reliance on US-based cloud perimeters is a liability. This guide details how to build a Zero-Trust environment using WireGuard, mTLS, and SSH CAs on Norwegian infrastructure.

Zero-Trust Infrastructure: Why Your VPN Is a Single Point of Failure (And How to Fix It)

Perimeter security is dead. In the wake of the Equifax breach and GDPR, relying on a single VPN gateway is professional negligence. Learn how to implement SSH Certificate Authorities, mTLS with Nginx, and true network isolation on CoolVDS.

Automating Security Compliance: Surviving the 2018 Regulatory Shift with Ansible and OpenSCAP

With the new EU data regulations looming, manual server hardening is a liability. Learn how to automate security baselines on CentOS 7 using Ansible and OpenSCAP, ensuring your infrastructure meets Norwegian Datatilsynet standards before the audit hits.

The Death of the Perimeter: Implementing Zero-Trust Architecture in 2017

The 'castle and moat' security strategy is obsolete. With GDPR enforcement looming and sophisticated lateral attacks on the rise, Norwegian CTOs must pivot to a Zero-Trust model. Here is how to implement Google-style BeyondCorp security on your Linux infrastructure today.

Server Hardening & Compliance: Automating Security for the Norwegian Cloud

Stop managing security with spreadsheets. We explore automating CentOS 7 hardening using Ansible to meet Datatilsynet standards, ensuring your infrastructure is as rigid as the Norwegian winter.

The Perimeter is Dead: Implementing Zero-Trust Security in 2015

The 'castle and moat' security strategy is failing. We explore how to implement Google's BeyondCorp-style Zero-Trust architecture using KVM, SSH keys, and rigorous segmentation on Norwegian infrastructure.