Continuous delivery for data protection by design— Automating traceability,...
Ensuring traceability and visibility are the two most important pillars for the application’s life cycle and for data protection by design.Continue reading on Sydseter »
View ArticleContinuous delivery for data protection by design — Quality assurance- and...
Just because you’re college, David, said it was ok, doesn’t mean that you can use whatever technology you want without approval or review.Continue reading on Sydseter »
View ArticleWhat is an Architect?
Have you ever dreamed of being an architect? We all have at some time or another, but what is an architect, and what does an architect do?Continue reading on Sydseter »
View ArticleContinuous delivery for data protection by design — Security and privacy...
Continuous delivery for data protection by design and by default — Security and privacy testing your microservicesIn a series of articles, I will present a way of continuously delivering software while...
View ArticleContinuous delivery for data protection by design and by default — Security...
Continuous delivery for data protection by design and by default — Security and privacy reviewsIn a series of articles, I will present a way of continuously delivering software while protecting the...
View ArticleContinuous delivery for data protection by design — customer satisfaction and...
Continuous delivery for data protection by design and by default — customer satisfaction, microservices and incident response plansIn a series of articles, I will present a way of continuously...
View ArticleGDPR compliant event sourcing with HashiCorp Vault
Events are records from the past. In the same way, as we can not rewrite the history books, we can’t remove immutable events.Continue reading on Sydseter »
View ArticleUsing mTLS to connect to S3 using Java AWS S3 SDK
Using mTLS to connect to S3 using Java or .NET AWS S3 SDKHere is how you setup an mTLS connection to Minio S3 using a TLS client certificate.Even though AWS S3 doesn’t support mTLS out-of-the-box so...
View ArticleRotating OAuth2 client credentials on Pivotal Cloud Foundry.
One of the biggest challenges in regards to information security is passwords and client secrets that never gets rotated…Continue reading on Sydseter »
View ArticleCyber Security in the c-suite and board rooms — Sikkerhetsfestivalen 2022
Disclaimer: Freely reproduced from the panel on “Cyber Security in the c-suite and board rooms” on “Sikkerhetsfestivalen” 2022. The…Continue reading on Sydseter »
View Article
More Pages to Explore .....