Quantcast
Channel: Stories by Johan Sydseter on Medium
Browsing latest articles
Browse All 12 View Live

Image may be NSFW.
Clik here to view.

Continuous delivery for data protection by design— Automating traceability,...

Ensuring traceability and visibility are the two most important pillars for the application’s life cycle and for data protection by design.Continue reading on Sydseter »

View Article



Image may be NSFW.
Clik here to view.

Continuous delivery for data protection by design — Quality assurance- and...

Just because you’re college, David, said it was ok, doesn’t mean that you can use whatever technology you want without approval or review.Continue reading on Sydseter »

View Article

Image may be NSFW.
Clik here to view.

What is an Architect?

Have you ever dreamed of being an architect? We all have at some time or another, but what is an architect, and what does an architect do?Continue reading on Sydseter »

View Article

Image may be NSFW.
Clik here to view.

Continuous delivery for data protection by design — Security and privacy...

Continuous delivery for data protection by design and by default — Security and privacy testing your microservicesIn a series of articles, I will present a way of continuously delivering software while...

View Article

Image may be NSFW.
Clik here to view.

Continuous delivery for data protection by design and by default — Security...

Continuous delivery for data protection by design and by default — Security and privacy reviewsIn a series of articles, I will present a way of continuously delivering software while protecting the...

View Article


Image may be NSFW.
Clik here to view.

Continuous delivery for data protection by design — customer satisfaction and...

Continuous delivery for data protection by design and by default — customer satisfaction, microservices and incident response plansIn a series of articles, I will present a way of continuously...

View Article

Image may be NSFW.
Clik here to view.

GDPR compliant event sourcing with HashiCorp Vault

Events are records from the past. In the same way, as we can not rewrite the history books, we can’t remove immutable events.Continue reading on Sydseter »

View Article

Image may be NSFW.
Clik here to view.

Using mTLS to connect to S3 using Java AWS S3 SDK

Using mTLS to connect to S3 using Java or .NET AWS S3 SDKHere is how you setup an mTLS connection to Minio S3 using a TLS client certificate.Even though AWS S3 doesn’t support mTLS out-of-the-box so...

View Article


Image may be NSFW.
Clik here to view.

Rotating OAuth2 client credentials on Pivotal Cloud Foundry.

One of the biggest challenges in regards to information security is passwords and client secrets that never gets rotated…Continue reading on Sydseter »

View Article


Image may be NSFW.
Clik here to view.

Cyber Security in the c-suite and board rooms — Sikkerhetsfestivalen 2022

Disclaimer: Freely reproduced from the panel on “Cyber Security in the c-suite and board rooms” on “Sikkerhetsfestivalen” 2022. The…Continue reading on Sydseter »

View Article
Browsing latest articles
Browse All 12 View Live




Latest Images