Johan SydseterinSydseterOWASP® Cornucopia 2.0I started out as a web designer 16 years ago and my first website got brutally hacked, not once, but twice. I learned the hard way about…Jun 10Jun 10
Johan SydseterinSydseterCyber Security in the c-suite and board rooms — Sikkerhetsfestivalen 2022Disclaimer: Freely reproduced from the panel on “Cyber Security in the c-suite and board rooms” on “Sikkerhetsfestivalen” 2022. The…Aug 30, 2022Aug 30, 2022
Johan SydseterinSydseterRotating OAuth2 client credentials on Pivotal Cloud Foundry.One of the biggest challenges in regards to information security is passwords and client secrets that never gets rotated…Nov 27, 2019Nov 27, 2019
Johan SydseterinSydseterUsing mTLS to connect to S3 using Java AWS S3 SDKHere is how you setup an mTLS connection to Minio S3 using a TLS client certificate.Sep 13, 2019Sep 13, 2019
Johan SydseterinSydseterGDPR compliant event sourcing with HashiCorp VaultEvents are records from the past. In the same way, as we can not rewrite the history books, we can’t remove immutable events.Sep 7, 20191Sep 7, 20191
Johan SydseterinSydseterContinuous delivery for data protection by design — customer satisfaction and incident response…A good incident response plan is about more than just being compliant, it’s about customer and employee satisfaction.Jun 4, 2019Jun 4, 2019
Johan SydseterinSydseterContinuous delivery for data protection by design and by default — Security and privacy reviewsThe supervisory authority is tasked with periodically reviewing the operation of the data controller. (article.41)…Jun 3, 2019Jun 3, 2019
Johan SydseterinSydseterContinuous delivery for data protection by design — Security and privacy testing microservices.Security is not something static that is defined once. Security is a dynamic property that changes over time.Jun 2, 2019Jun 2, 2019
Johan SydseterinSydseterWhat is an Architect?Have you ever dreamed of being an architect? We all have at some time or another, but what is an architect, and what does an architect do?Jun 1, 2019Jun 1, 2019
Johan SydseterinSydseterContinuous delivery for data protection by design — Quality assurance- and approval of tools and …Just because you’re college, David, said it was ok, doesn’t mean that you can use whatever technology you want without approval or review.May 27, 2019May 27, 2019