Tags¶
AI¶
- AI is not the future it is a warning
- Don’t Get Distracted by the Shiny New Toy: Why Cybersecurity Still Needs Old-School Discipline
AKS¶
- Azure AKS platform
- Azure DevOps pipeline strategy
- Implementing “Burton” Network Segmentation in AKS
- Managing developer access to AKS and Azure DevOps with Zero Trust
- Mapping Azure AKS platform to security frameworks
- Strategy for advanced AKS
Active Directory¶
Application Proxy¶
ArgoCD¶
Azure Key vault¶
Cybersecurity¶
- Rethinking Risk: Cybersecurity
- Securing news websites targeted for crime reporting
- The consequences of the Ukraine-Russia war for cybersecurity
- The human factor in Azure security
- The human factor in Azure security
- Understanding Pegasus The worlds most advanced spyware
DevOps¶
Digital ethics¶
Dystopia¶
GitOps¶
Governance¶
- Rethinking Risk: Cybersecurity
- Securing news websites targeted for crime reporting
- The Evolution of IT: 2 decades
- The consequences of the Ukraine-Russia war for cybersecurity
- The human factor in Azure security
- The human factor in Azure security
Hyper-V¶
ISO27001¶
- Azure AKS platform
- Azure DevOps pipeline strategy
- Implementing “Burton” Network Segmentation in AKS
- Managing developer access to AKS and Azure DevOps with Zero Trust
- Mapping Azure AKS platform to security frameworks
IT culture¶
IT-operations¶
Infra¶
- Azure AKS platform
- Azure DevOps pipeline strategy
- Implementing “Burton” Network Segmentation in AKS
- Managing developer access to AKS and Azure DevOps with Zero Trust
- Mapping Azure AKS platform to security frameworks
Infrastructure¶
- Strategy for advanced AKS
- Whitepaper: Modern network access for remote users
- Whitepaper: Secure Management of Passwords and Secrets
Istio¶
Liseberg¶
Movies¶
Music¶
NIS2¶
- Azure AKS platform
- Azure DevOps pipeline strategy
- Implementing “Burton” Network Segmentation in AKS
- Managing developer access to AKS and Azure DevOps with Zero Trust
- Mapping Azure AKS platform to security frameworks
Nightwish¶
Pegasus¶
Powershell¶
- List all computers with a specific file
- SQL Log Shipping Copy
- SQL Log shipping restore
- Unmount VM-ISOs after days
- VMware to cmdb script part 1
- VMware to cmdb script part 2
- get-vmdiskstorage
- tail -f for powershell
Rambling¶
- Migration of old stuff
- We Succeed When We Succeed Together
- Will try to start to write sometimes of what i am doing.
Remote Users¶
SQL¶
Self drive¶
Social media¶
Spyware¶
Thoughts¶
- # V for Vendetta, the dystopia that became reality
- Cybersecurity is not a roller coaster ride
- Why politeness matters, even with opponents
Threats¶
VMWare¶
VPN¶
Whitepaper¶
- Whitepaper: Modern network access for remote users
- Whitepaper: Secure Management of Passwords and Secrets