Swedish innovation hub specializing in creating immersive and precise game experiences alongside expert cybersecurity consulting and solutions.
|
Realistic 2D precision combat simulator inspired by traditional Korean martial arts, focusing on precise anatomical targeting, authentic combat techniques, and detailed physics-based interactions. |
![]() |
Political transparency platform monitoring Swedish political activity with data-driven insights, analytics, dashboard visualizations, and accountability metrics. |
|
Enterprise-grade multi-region active/active architecture with near-zero recovery time, comprehensive DNS failover, and AWS Resilience Hub policy compliance for mission-critical applications. |
|
SonarQube plugin for analyzing AWS CloudFormation templates with security best practices based on NIST, CWE, and ISO standards. |
Professional cybersecurity consulting services delivered remotely or in-person in Gothenburg. Drawing from over three decades of experience in software development and security architecture, we deliver practical security solutions that integrate seamlessly into your development processes without hindering innovation.
🌐 Availability | Remote or in-person (Gothenburg) |
💰 Pricing | Contact for pricing |
🏢 Company | Hack23 AB (Org.nr 5595347807) |
📧 Contact |
Area | Services | Ideal for |
---|---|---|
🏗️ Security Architecture & Strategy |
Enterprise Security Architecture: Design and implementation of comprehensive security frameworks Risk Assessment & Management: Systematic identification and mitigation of security risks Security Strategy Development: Alignment of security initiatives with business objectives Governance Framework Design: Policy development and security awareness programs |
Organizations needing strategic security leadership and architectural guidance |
☁️ Cloud Security & DevSecOps |
Secure Cloud Solutions: AWS security assessment and architecture (Advanced level) DevSecOps Integration: Security seamlessly integrated into agile development processes Infrastructure as Code Security: Secure CloudFormation, Terraform implementations Container & Serverless Security: Modern application security best practices |
Development teams transitioning to cloud-native architectures with security focus |
🔧 Secure Development & Code Quality |
Secure SDLC Implementation: Building security into development lifecycles CI/CD Security Integration: Automated security testing and validation Code Quality & Security Analysis: Static analysis, vulnerability scanning Supply Chain Security: SLSA Level 3 compliance, SBOM implementation |
Development teams seeking to embed security without slowing innovation |
Category | Services | Value |
---|---|---|
📋 Compliance & Regulatory |
Regulatory Compliance: GDPR, NIS2, ISO 27001 implementation ISMS Design & Implementation: Information Security Management Systems AI Governance: Emerging AI risk management frameworks Audit Preparation: Documentation and evidence preparation |
Navigate complex regulatory landscapes with confidence |
🌐 Open Source Security |
Open Source Program Office: OSPO establishment and management Vulnerability Management: Open source risk assessment and remediation Security Tool Development: Custom security solutions and automation Community Engagement: Open source security best practices |
Leverage open source securely while contributing to security transparency |
🎓 Security Culture & Training |
Security Awareness Programs: Building organization-wide security culture Developer Security Training: Secure coding practices and methodologies Leadership Security Briefings: Executive-level security understanding Incident Response Training: Preparedness and response capability building |
Transform security from barrier to enabler through education and culture |
Three decades of hands-on experience in software development and security architecture means we understand the real challenges development teams face. We don't just point out problems—we provide practical, implementable solutions that enhance security without slowing down innovation.
Our approach: Security should be seamlessly integrated into your existing processes, not bolted on afterward. We help organizations build a culture of security awareness where protection becomes a natural part of how teams work, not an obstacle to overcome.
Passionate about transparency: As advocates for open source security, we believe in sharing knowledge and building community. Our solutions are designed to be understandable, maintainable, and aligned with industry best practices.
%%{
init: {
'theme': 'base',
'themeVariables': {
'primaryColor': '#d1c4e9',
'primaryTextColor': '#1a1a1a',
'primaryBorderColor': '#9575cd',
'lineColor': '#9575cd',
'secondaryColor': '#c8e6c9',
'tertiaryColor': '#bbdefb'
}
}
}%%
mindmap
root((CIA Triad<br>Security Focus))
Confidentiality
::icon(fa fa-lock)
Data Classification
::icon(fa fa-tag)
Public
Restricted
Confidential
Secret
Access Control
::icon(fa fa-shield)
RBAC Implementation
MFA Integration
Least Privilege
Encryption
::icon(fa fa-key)
AES-256
Quantum-Safe Encryption
KMS Integration
Integrity
::icon(fa fa-check-circle)
Data Validation
::icon(fa fa-check)
Manual Checks
Automated Validation
Blockchain Records
Change Control
::icon(fa fa-history)
Audit Trails
Versioning
Non-Repudiation
Quality Assurance
::icon(fa fa-certificate)
Code Analysis
Test Coverage
SLSA Level 3
Availability
::icon(fa fa-clock-o)
Resilience Levels
::icon(fa fa-line-chart)
Backup/Restore
Pilot Light
Warm Standby
Multi-Site Active/Active
Recovery Metrics
::icon(fa fa-tachometer)
RTO Targets
RPO Objectives
Uptime SLAs
Monitoring
::icon(fa fa-eye)
Health Checks
Alerting
Chaos Testing
Featured article on innovative use of technology for political transparency Read Article |
Coverage on Citizen Intelligence Agency's monitoring capabilities Read Article |
Recognized in survey of parliamentary monitoring organizations View Report |
%%{
init: {
'theme': 'base',
'themeVariables': {
'primaryColor': '#a0c8e0',
'primaryTextColor': '#1a1a1a',
'primaryBorderColor': '#86b5d9',
'lineColor': '#86b5d9',
'secondaryColor': '#c8e6c9',
'tertiaryColor': '#ffda9e'
}
}
}%%
mindmap
root((James Pether<br>Sörling))
Security Architecture
::icon(fa fa-lock)
CIA Triad Implementation
Zero Trust Architectures
AWS Security Services
Compliance Frameworks
NIST 800-53
ISO 27001
GDPR
Cloud Engineering
::icon(fa fa-cloud)
Multi-Region Architectures
Resilience Engineering
Private VPC Security
CloudFormation/Terraform
Software Development
::icon(fa fa-code)
Java & Spring
React & TypeScript
PostgreSQL
CI/CD Automation
Open Source Leadership
::icon(fa fa-github)
CIA Compliance Manager
Citizen Intelligence Agency
Sonar-CloudFormation-Plugin
cfn-nag Contributor
Experienced technology professional specializing in information security and delivery of secure cloud systems. Strong advocate for transparency in organizations and committed to ensuring robust security posture for modern applications through open source solutions.
Last updated: 2025-05-13 08:23:39