🗺️ Site Map

Complete overview of all pages and content on hack23.com

This page provides a complete hierarchical view of our website's structure. Use it to discover content, understand our offerings, and navigate directly to any page.

🏠 Home & Company

Learn about Hack23's mission, values, and approach to transparent cybersecurity consulting. Explore our commitment to radical openness and the CIA Triad fundamentals.

  • Homepage Swedish cybersecurity consulting with radical ISMS transparency, open-source security projects, and precision gaming innovation
  • Why Hack23? Sweden's only public ISMS consultancy with CISSP/CISM expertise, current practitioner insights, and developer-friendly security approach
  • CIA Triad FAQ Comprehensive guide to Confidentiality, Integrity, Availability principles with data classification, compliance frameworks, and implementation best practices
  • Accessibility Statement Our commitment to WCAG 2.1 Level AA accessibility, digital inclusion, and web accessibility compliance

🔑 Services

Professional cybersecurity consulting services including security architecture design, cloud security and DevSecOps implementation, and compliance frameworks. Evidence-based security consulting backed by our public ISMS.

  • All Services Complete cybersecurity consulting portfolio covering architecture, cloud security, DevSecOps, compliance, and open source security for Swedish enterprises
  • Security Architecture Enterprise security framework design, risk assessment, governance development, and strategic security planning aligned with business objectives
  • Cloud Security & DevSecOps AWS security assessment (Advanced level), secure Infrastructure as Code, CI/CD integration, container and serverless security best practices
  • Compliance & Regulatory ISO 27001, GDPR, NIS2 implementation support with ISMS design, audit preparation, and AI governance for regulatory compliance
  • Security Assessment Checklist Comprehensive security evaluation framework covering technical controls, risk management, and compliance readiness for organizations

🏭 Industry-Specific Services

Specialized cybersecurity consulting tailored for specific industries including betting & gaming, cannabis, and investment & FinTech sectors. Addressing unique regulatory requirements and security challenges.

  • Betting & Gaming Security Specialized cybersecurity for online betting operators: ISO 27001, MGA/UKGC/SGA compliance, DDoS protection, fraud prevention, and payment security
  • Cannabis Industry Security Enterprise cybersecurity services for cannabis industry: Security architecture, data protection, payment security, and compliance frameworks for dispensaries, cultivators, and cannabis tech platforms
  • Investment & FinTech Security Specialized cybersecurity for investment firms and FinTech: SOC 2 Type II, ISO 27001, MiFID II/PSD2 compliance, trading platform security, crypto exchange protection

📋 ISO 27001 Implementation Guides

Comprehensive guides for ISO 27001 implementation, certification, and compliance in Sweden. Practical insights from real-world experience with cost analysis, timelines, and common pitfalls.

  • ISO 27001 Implementation in Sweden Complete guide to ISO 27001 implementation in Sweden: 90-day roadmap, cost analysis (€25,000-€50,000), SWEDAC certification bodies, and practical lessons from Hack23's public ISMS
  • ISO 27001 Certification Costs Detailed cost analysis for ISO 27001 certification in Sweden: certification body fees (€8,000-€20,000), consultant rates, internal time investment, and ROI calculation for Swedish SMEs
  • ISO 27001:2022 vs 2013 Detailed comparison of ISO 27001:2022 vs 2013: 93 controls (down from 114), new cloud security controls, attribute-based structure, and transition guidance for Swedish organizations
  • Common Implementation Mistakes Learn from real mistakes: over-scoping, documentation complexity, skipping risk assessment, weak executive support, and neglecting post-certification maintenance

🚀 Projects

Open-source security projects demonstrating practical security implementation. From political transparency platforms to compliance tools and cultural preservation through gaming.

  • Project Portfolio Overview of all Hack23 open-source projects: Black Trigram, Citizen Intelligence Agency, and CIA Compliance Manager with GitHub links
  • Black Trigram
    • Overview Korean martial arts precision combat simulator preserving Taekkyeon and Hapkido traditions through authentic gameplay and educational value
    • Features 70 anatomical vital points system, 5 fighter archetypes (Musa, Amsalja, Hacker, Intelligence, Organized Crime), realistic combat physics
    • Documentation Technical documentation covering combat mechanics, vital point targeting, fighter archetypes, and cultural authenticity in traditional Korean martial arts
  • Citizen Intelligence Agency
    • Overview OSINT platform for Swedish parliamentary monitoring with political activity tracking, transparency metrics, and democratic accountability tools
    • Features Interactive political dashboards, politician ranking systems, voting pattern analysis, financial performance tracking, and transparency insights from Swedish government data
    • Documentation Technical architecture documentation for Java/Spring Boot platform with PostgreSQL, data pipeline, and Swedish parliamentary data integration
  • CIA Compliance Manager
    • Overview Browser-based CIA triad assessment tool with automated compliance mapping to ISO 27001, NIST, GDPR, HIPAA frameworks without backend dependencies
    • Features Security level assessment, multi-framework compliance mapping, business impact analysis, threat modeling with STRIDE, and real-time control effectiveness tracking
    • Documentation Technical documentation for React/TypeScript platform with IndexedDB storage, compliance frameworks integration, and security assessment methodology

🍎 Blog & Insights

65+ blog posts covering cybersecurity, ISMS policies, security architecture, and Discordian security philosophy. Featuring Simon Moon's Architecture Chronicles, Hagbard Celine's Intelligence Operations, and George Dorn's code analysis.

  • All Blog Posts Complete index of 65+ cybersecurity blog posts covering ISMS policies, architecture patterns, Discordian philosophy, and technical deep-dives
  • Discordian Cybersecurity Manifesto on nation-state surveillance capabilities, crypto backdoor paradoxes, and transparent security through public ISMS - "Think for yourself, question authority"
  • CIA Project Series
    • CIA Architecture Five Pentacles of Political Transparency: System architecture with C4 models, domain-driven design patterns for democratic OSINT platform
    • CIA Security Defense Through Transparency: Security architecture leveraging public disclosure as protective strategy for parliamentary monitoring platform
    • CIA Workflows Five-stage CI/CD pipeline with state machines, GitHub Actions orchestration, and DevSecOps automation for Swedish political data processing
    • CIA Mindmaps Conceptual Sacred Geometry: Hierarchical thinking patterns revealing natural organizational structures in parliamentary data and democratic oversight
    • CIA OSINT Intelligence Open Source Intelligence methodology applied to Swedish politics with data aggregation, pattern detection, and transparency-driven analysis techniques
    • CIA Future Security Pentagon of Tomorrow: Post-quantum cryptography, AI-augmented threat detection, and future security architecture for political transparency platforms
    • CIA Financial Strategy $24.70/Day Democracy: AWS cost optimization, golden ratio budget allocation, and economic sustainability model for public political monitoring
    • CIA Business Case: Global News Scaling parliamentary transparency platform globally: Business model for international news organizations and democratic oversight expansion
    • CIA Swedish Media Election 2026 Data-driven election analysis platform for Swedish media: Real-time political tracking, voter sentiment analysis, and transparency metrics dashboard
    • CIA Alternative Media Discordian 2026 Alternative media strategy for 2026 election: Discordian approach to political transparency through crowd-sourced OSINT and radical openness
  • Black Trigram Series
    • Trigram Architecture Five Fighters Sacred Geometry: Combat system architecture with five archetypes crystallized from Korean martial arts domain analysis
    • Trigram Combat 70 Vital Points & Physics of Respect: Traditional Korean martial arts biomechanics with anatomical targeting and realistic trauma simulation
    • Trigram Future VR Martial Arts & Immersive Combat: Five-year evolution roadmap from 2D fighter to VR training platform for Korean martial arts education
  • Compliance Series
    • Compliance Architecture CIA Triad Meets Sacred Geometry: Security capability maturation framework with assessment levels and compliance mapping architecture
    • Compliance Security STRIDE Through Five Dimensions: Six STRIDE threat categories compressed into five defensive requirements for security assessment tools
    • Compliance Future Context-Aware Security & Adaptive Defense: Future architecture transcending static assessment with dynamic threat intelligence integration
  • Code Analysis Series
    • George Dorn CIA Code Repository deep-dive: Java 25, Spring Boot, PostgreSQL with 49 Maven modules, 1,372 files, 60+ database tables for parliamentary monitoring
    • George Dorn Compliance Code Repository deep-dive: TypeScript 5.9, React 19, IndexedDB with 220 files, zero backend, 95% attack surface eliminated for security assessment
    • George Dorn Trigram Code Repository deep-dive: TypeScript 5.9, React 19, PixiJS 8 with 132 files implementing 70 vital points system for martial arts simulation
  • Industry-Specific Security
    • Betting & Gaming Cybersecurity Comprehensive cybersecurity guide for online betting and gaming operators: ISO 27001 certification, MGA/UKGC/SGA compliance, DDoS mitigation, fraud prevention, and responsible gambling measures
    • Cannabis Cybersecurity Guide Complete cybersecurity guide for cannabis dispensaries and cultivators: POS security, payment fraud prevention, data protection, and enterprise security for cannabis businesses
    • Investment Firm Security Comprehensive guide to cybersecurity for investment firms and hedge funds: SOC 2 Type II vs ISO 27001 comparison, regulatory compliance (MiFID II, GDPR), trading platform security
    • Medical Cannabis Data Protection Medical cannabis patient data protection guide: Enterprise data security practices for protecting patient privacy, health information, and prescription data in medical cannabis operations
  • Thought Leadership
    • Automated Convergence Security, Cloud, DevSecOps convergence: Automated infrastructure patterns integrating security controls into cloud-native development workflows
    • Information Hoarding How information hoarding destroys data integrity: Organizational knowledge silos undermining security awareness and decision-making quality
    • Public ISMS Benefits Benefits of radical ISMS transparency: Trust through verification, competitive advantage, accountability through visibility, security excellence demonstration
  • Election Analysis
    • Swedish Election 2026 Data-driven analysis of Swedish 2026 election: Party positioning, voter trends, policy impacts using OSINT methodology and transparency metrics

🛡️ ISMS & Security Policies

40+ public security policies covering ISO 27001 controls, risk management, compliance frameworks, and operational security. Complete transparency in information security management—our ISMS is our competitive advantage.

  • Information Security Policy Foundation of radical transparency: Overarching security governance framework establishing organizational security principles and management commitment
  • ISMS Transparency Security through radical openness: 70% public framework, 30% redacted operational details published on GitHub demonstrating security excellence
  • ISMS Review Keeping security frameworks relevant: Continuous improvement processes, strategic reviews, and ISMS effectiveness measurement methodology
  • Compliance Theater vs. reality: Practical compliance implementation distinguishing meaningful security controls from checkbox exercises and audit preparation
  • Compliance Frameworks ISO 27001, NIST CSF, CIS Controls alignment: Multi-framework mapping demonstrating control coverage across regulatory requirements
  • Risk Management
    • Risk Assessment Calculating what you can't prevent: Systematic risk identification, analysis, and evaluation methodology with business impact assessment
    • Risk Register Living document of what keeps you up at night: Enterprise risk tracking, treatment plans, and risk acceptance documentation
    • Threat Modeling Know thy enemy—they already know you: STRIDE framework, MITRE ATT&CK integration, and attack tree development for threat analysis
  • Access & Identity
    • Access Control Trust no one including yourself: AWS Identity Center SSO, MFA enforcement, 90-day dormant reviews with zero-trust identity-centric security
    • Remote Access VPNs and the death of the office: Secure remote access controls, endpoint security requirements, and distributed workforce security architecture
    • Acceptable Use Don't do stupid shit on company systems: Clear acceptable use guidelines preventing security incidents through user behavior policies
  • Data Protection
    • Data Protection GDPR wants to know your location: Data handling requirements, privacy controls, and regulatory compliance for personal data protection
    • Data Classification Five levels of actually giving a damn: Classification framework from Public to Top Secret with handling requirements for each sensitivity level
    • Classification Classification beyond compliance theater: Practical data classification methodology driving security decisions and resource allocation
    • Privacy Surveillance capitalism meets anarchist data protection: Privacy-by-design principles, data minimization, and user rights protection
    • Cryptography Question authority—crypto approved by spies: TLS 1.3, encryption at rest, key management avoiding Dual_EC_DRBG and backdoored algorithms
  • Technical Security
    • Network Security The perimeter is dead, long live the perimeter: Cloud-native network controls, WAF, CDN security, and zero-trust network architecture
    • Cloud Security Someone else's computer: AWS security controls, shared responsibility model, infrastructure as code security, and cloud-native protection
    • Email Security Your CEO doesn't need iTunes cards: SPF, DKIM, DMARC configuration preventing phishing, business email compromise, and social engineering attacks
    • Mobile Device Security BYOD means Bring Your Own Disaster: Mobile device management policies, endpoint security controls, and acceptable use for personal devices
    • Vulnerability Management Patch or perish: Systematic vulnerability identification, assessment, remediation, and verification with SLA-driven patching processes
  • Development & AI
    • Secure Development Code without backdoors on purpose: Secure SDLC, threat modeling integration, security testing automation, and supply chain security practices
    • AI Policy Teaching machines not to hallucinate secrets: AI governance framework, responsible AI development, and LLM security risk management
    • LLM Security Training AI not to hallucinate your secrets: OWASP LLM Top 10 controls, prompt injection prevention, and AI security best practices
    • Open Source Trust through transparency: Open Source Program Office management, vulnerability assessment, security tool development, and community engagement
  • Operations
    • Change Management Move fast without breaking everything: Risk-controlled change processes, deployment gates, rollback procedures, and configuration management
    • Asset Management You can't protect what you don't know you have: Asset inventory, lifecycle management, and ownership tracking for security baseline
    • Monitoring & Logging If a tree falls and nobody logs it: Security event monitoring, log aggregation, SIEM integration, and incident detection capabilities
    • Backup & Recovery Restore or regret: Backup strategy, recovery testing, data retention policies, and business continuity through reliable data restoration
  • Business Continuity
    • Business Continuity Survive the chaos: Business continuity planning, critical process identification, alternative work arrangements, and resilience strategies
    • Disaster Recovery Plan B when everything burns: Disaster recovery procedures, RTO/RPO targets, failover testing, and crisis management protocols
    • Incident Response When not if shit hits the fan: Incident response procedures, escalation paths, forensics preservation, and coordinated disclosure protocols
  • Governance
    • Security Strategy Strategic security planning aligned with business objectives: Risk appetite definition, security investment prioritization, and executive governance
    • Security Metrics Measuring what actually matters: KPI development, security posture tracking, effectiveness measurement, and data-driven decision making
    • Security Training Teaching humans not to click shit: Security awareness programs, phishing simulations, role-based training, and security culture development
    • Stakeholders Who cares about your security and why: Stakeholder identification, communication strategies, and engagement for security program success
    • Business Value The security-industrial complex: Demonstrating security ROI, business enablement, and competitive advantages through effective security programs
  • Third Party & Supply Chain
    • Third Party Security Trust your vendors? LOL: Third-party risk assessment, vendor security reviews, supply chain security, and contractual security requirements
    • Supplier Reality Supplier risk management beyond compliance theater: Practical vendor assessment, ongoing monitoring, and supply chain security reality checks
  • Physical & Facilities
    • Physical Security Locks, guards, and clever social engineering: Physical access controls, facility security, visitor management, and premises protection
  • Regulatory Compliance
    • CRA (Cyber Resilience Act) Brussels regulates your toaster: EU Cyber Resilience Act requirements, product security lifecycle, vulnerability disclosure, and compliance roadmap
    • CRA Conformity CRA conformity assessment procedures: Self-assessment, third-party certification, technical documentation, and ongoing compliance requirements

🌐 Languages

Multilingual content supporting global audiences. Core content available in English, Swedish, Korean, Dutch, German, French, Japanese, Chinese, Spanish, Hebrew, and Arabic.

  • 🇬🇧 English (default)
  • 🇸🇪 Swedish
    • Swedish Sitemap Complete Swedish-language site navigation map for all Hack23 pages and services
    • Swedish Services Cybersäkerhetstjänster på svenska: Säkerhetsarkitektur, molnsäkerhet, DevSecOps, och regelefterlevnad för svenska företag
    • Why Hack23 (Swedish) Varför välja Hack23: Sveriges enda publika ISMS-konsultföretag med transparent säkerhetspraxis och öppen källkod
    • CIA Triad FAQ (Swedish) CIA-triaden på svenska: Konfidentialitet, Integritet, Tillgänglighet med praktiska implementeringsguider
    • CIA Features (Swedish) Citizen Intelligence Agency funktioner på svenska: Riksdagsövervakning, politisk transparens, och demokratisk insyn
    • CIA Docs (Swedish) CIA teknisk dokumentation på svenska: Arkitektur, dataflöden, och svenska parlamentariska datakällor
    • Compliance Manager Features (Swedish) Compliance Manager funktioner på svenska: CIA-triad bedömning, ramverk mappning, och affärspåverkansanalys
    • Compliance Manager Docs (Swedish) Compliance Manager dokumentation på svenska: Teknisk arkitektur, säkerhetsbedömningsmetodik, och regelverkskrav
    • Blog (Swedish) Säkerhetsblogg på svenska: Cybersäkerhet, ISMS-policyer, och Discordian säkerhetsfilosofi
    • Accessibility Statement (Swedish) Tillgänglighetsredogörelse: Vårt åtagande för WCAG 2.1 AA-efterlevnad och digital inkludering
    • Public ISMS Benefits (Swedish) Fördelar med öppet ISMS på svenska: Transparens, förtroende, och konkurrensfördel genom verifierbar säkerhet
    • CIA Swedish Media Election (Swedish) Valet 2026 på svenska: Datadriven valanalys för svenska medier med politisk transparensplattform
    • Swedish Election 2026 (Swedish) Svenska valet 2026: Partidata, väljaranalyser, och policygenomgång med OSINT-metodik
  • 🇰🇷 Korean
    • Korean Sitemap Complete Korean-language site navigation map for Hack23 cybersecurity services and martial arts projects
    • Korean Services 사이버 보안 서비스: 보안 아키텍처, 클라우드 보안, DevSecOps, 규정 준수 컨설팅
    • Blog (Korean) 보안 블로그: 사이버 보안, ISMS 정책 및 Discordian 보안 철학
    • Black Trigram Features (Korean) 검은 삼괘 특징: 70개 급소 시스템, 5개 전사 원형, 태권도 및 합기도 기술로 한국 무술 보존
    • Black Trigram Docs (Korean) 검은 삼괘 문서: 전투 역학, 급소 타격, 전사 원형 및 한국 무술 문화적 진정성
  • 🇳🇱 Dutch
    • Dutch Sitemap Complete Dutch-language site navigation map: Cybersecurity consulting services, open-source projects, and security policies
    • Homepage (Dutch) Nederlandse homepage: Cyberbeveiligingsconsultancy met transparante ISMS en open-source projecten
    • Services (Dutch) Cyberbeveiligingsdiensten: Beveiligingsarchitectuur, cloudbeveiliging, en compliance voor Nederlandse bedrijven
    • Blog (Dutch) Beveiligingsblog: Cyberbeveiliging, ISMS-beleid, en Discordian beveiligingsfilosofie
  • 🇩🇪 German
    • German Sitemap Complete German-language site navigation map: Cybersicherheitsberatung, Open-Source-Projekte, und Sicherheitsrichtlinien
    • Homepage (German) Deutsche Homepage: Cybersicherheitsberatung mit transparentem ISMS und Open-Source-Projekten
    • Services (German) Cybersicherheitsdienste: Sicherheitsarchitektur, Cloud-Sicherheit, und Compliance für deutsche Unternehmen
    • Blog (German) Sicherheitsblog: Cybersicherheit, ISMS-Richtlinien, und Discordian Sicherheitsphilosophie
  • 🇫🇷 French
    • French Sitemap Complete French-language site navigation map: Services de cybersécurité, projets open source, et politiques de sécurité
    • Homepage (French) Page d'accueil française: Conseil en cybersécurité avec ISMS transparent et projets open source
    • Services (French) Services de cybersécurité: Architecture de sécurité, sécurité cloud, et conformité pour entreprises françaises
    • Blog (French) Blog sécurité: Cybersécurité, politiques ISMS, et philosophie de sécurité Discordian
  • 🇯🇵 Japanese
    • Japanese Sitemap Complete Japanese-language site navigation map: サイバーセキュリティコンサルティング、オープンソースプロジェクト、セキュリティポリシー
    • Homepage (Japanese) 日本語ホームページ: 透明なISMSとオープンソースプロジェクトによるサイバーセキュリティコンサルティング
    • Services (Japanese) サイバーセキュリティサービス: セキュリティアーキテクチャ、クラウドセキュリティ、コンプライアンス
    • Blog (Japanese) セキュリティブログ: サイバーセキュリティ、ISMSポリシー、Discordianセキュリティ哲学
  • 🇨🇳 Chinese
    • Chinese Sitemap Complete Chinese-language site navigation map: 网络安全咨询服务、开源项目和安全策略
    • Homepage (Chinese) 中文主页:透明ISMS和开源项目的网络安全咨询
    • Services (Chinese) 网络安全服务:安全架构、云安全、合规咨询
    • Blog (Chinese) 安全博客:网络安全、ISMS政策、Discordian安全哲学
  • 🇪🇸 Spanish
    • Spanish Sitemap Complete Spanish-language site navigation map: Servicios de ciberseguridad, proyectos de código abierto, y políticas de seguridad
    • Homepage (Spanish) Página principal en español: Consultoría de ciberseguridad con ISMS transparente y proyectos de código abierto
    • Services (Spanish) Servicios de ciberseguridad: Arquitectura de seguridad, seguridad en la nube, cumplimiento normativo
    • Blog (Spanish) Blog de seguridad: Ciberseguridad, políticas ISMS, filosofía de seguridad Discordian
  • 🇸🇦 Arabic
    • Arabic Sitemap Complete Arabic-language site navigation map: خدمات الأمن السيبراني، مشاريع مفتوحة المصدر، سياسات الأمن
    • Homepage (Arabic) الصفحة الرئيسية بالعربية: استشارات الأمن السيبراني مع ISMS شفاف ومشاريع مفتوحة المصدر
    • Services (Arabic) خدمات الأمن السيبراني: هندسة الأمن، أمن السحابة، الامتثال التنظيمي
    • Blog (Arabic) مدونة الأمن: الأمن السيبراني، سياسات ISMS، فلسفة الأمن Discordian
  • 🇮🇱 Hebrew
    • Hebrew Sitemap Complete Hebrew-language site navigation map: שירותי אבטחת סייבר, פרויקטים בקוד פתוח, מדיניות אבטחה
    • Homepage (Hebrew) דף הבית בעברית: ייעוץ אבטחת סייבר עם ISMS שקוף ופרויקטים בקוד פתוח
    • Services (Hebrew) שירותי אבטחת סייבר: ארכיטקטורת אבטחה, אבטחת ענן, ציות רגולטורי
    • Blog (Hebrew) בלוג אבטחה: אבטחת סייבר, מדיניות ISMS, פילוסופיית אבטחה Discordian
  • 🇩🇰 Danish
    • Danish Sitemap Complete Danish-language site navigation map: Cybersikkerhedsrådgivning, open source-projekter, sikkerhedspolitikker
    • Homepage (Danish) Dansk hjemmeside: Cybersikkerhedsrådgivning med transparent ISMS og open source-projekter
    • Services (Danish) Cybersikkerhedstjenester: Sikkerhedsarkitektur, cloud-sikkerhed, compliance for danske virksomheder
    • Blog (Danish) Sikkerhedsblog: Cybersikkerhed, ISMS-politikker, Discordian sikkerhedsfilosofi
    • Why Hack23 (Danish) Hvorfor Hack23: Transparent sikkerhedspraxis og open source tilgang til cybersikkerhed
  • 🇫🇮 Finnish
    • Finnish Sitemap Complete Finnish-language site navigation map: Kyberturvallisuuspalvelut, avoimen lähdekoodin projektit, turvapolitiikat
    • Homepage (Finnish) Suomenkielinen etusivu: Kyberturvallisuuskonsultointi läpinäkyvällä ISMS:llä ja avoimen lähdekoodin projekteilla
    • Services (Finnish) Kyberturvallisuuspalvelut: Turvallisuusarkkitehtuuri, pilviturvallisuus, vaatimustenmukaisuus suomalaisille yrityksille
    • Blog (Finnish) Turvallisuusblogi: Kyberturvallisuus, ISMS-politiikat, Discordian turvallisuusfilosofia
    • Why Hack23 (Finnish) Miksi Hack23: Läpinäkyvä turvallisuuskäytäntö ja avoimen lähdekoodin lähestymistapa
  • 🇳🇴 Norwegian
    • Norwegian Sitemap Complete Norwegian-language site navigation map: Cybersikkerhetstjenester, open source-prosjekter, sikkerhetspolitikker
    • Homepage (Norwegian) Norsk hjemmeside: Cybersikkerhetsrådgivning med transparent ISMS og open source-prosjekter
    • Services (Norwegian) Cybersikkerhetstjenester: Sikkerhetsarkitektur, sky-sikkerhet, compliance for norske bedrifter
    • Blog (Norwegian) Sikkerhetsblogg: Cybersikkerhet, ISMS-policyer, Discordian sikkerhetsfilosofi
    • Why Hack23 (Norwegian) Hvorfor Hack23: Transparent sikkerhetspraksis og open source-tilnærming til cybersikkerhet

🔧 Technical

Technical resources including XML sitemap for search engines, robots.txt configuration, and links to our public GitHub repositories for complete transparency.

  • XML Sitemap Machine-readable sitemap for search engine crawlers with all pages, last modification dates, and update frequencies
  • Robots.txt Crawler instructions specifying allowed and disallowed paths, sitemap location, and crawl-delay configuration
  • GitHub - Public ISMS Complete Information Security Management System with 40+ policies, compliance frameworks, and security documentation on GitHub
  • GitHub - Homepage Source code for hack23.com static website: HTML/CSS, CI/CD workflows, security scanning, and performance optimization

📊 Site Statistics