Welcome to the Hack23 homepage repository. This is the source code for Hack23, a Swedish innovation hub founded in 2025 by James Pether Sรถrling, focusing on precision gaming experiences, security, compliance, and transparency tools.
Hack23 AB is a Swedish registered company (Org.nr 5595347807) founded in 2025 as an innovation hub specializing in creating immersive and precise game experiences alongside expert cybersecurity consulting. Drawing from over three decades of experience in software development and security architecture, we deliver practical security solutions that integrate seamlessly into development processes without hindering innovation. Our flagship project, Black Trigram, represents the pinnacle of realistic martial arts gaming combined with educational value.
Professional cybersecurity consulting services delivered remotely or in-person in Gothenburg. Drawing from over three decades of experience in software development and security architecture, we deliver practical security solutions that integrate seamlessly into your development processes without hindering innovation.
๐ Availability | Remote or in-person (Gothenburg) |
๐ฐ Pricing | Contact for pricing |
๐ข Company | Hack23 AB (Org.nr 5595347807) |
๐ง Contact |
Area | Services | Ideal for |
---|---|---|
๐๏ธ Security Architecture & Strategy |
Enterprise Security Architecture: Design and implementation of comprehensive security frameworks Risk Assessment & Management: Systematic identification and mitigation of security risks Security Strategy Development: Alignment of security initiatives with business objectives Governance Framework Design: Policy development and security awareness programs |
Organizations needing strategic security leadership and architectural guidance |
โ๏ธ Cloud Security & DevSecOps |
Secure Cloud Solutions: AWS security assessment and architecture (Advanced level) DevSecOps Integration: Security seamlessly integrated into agile development processes Infrastructure as Code Security: Secure CloudFormation, Terraform implementations Container & Serverless Security: Modern application security best practices |
Development teams transitioning to cloud-native architectures with security focus |
๐ง Secure Development & Code Quality |
Secure SDLC Implementation: Building security into development lifecycles CI/CD Security Integration: Automated security testing and validation Code Quality & Security Analysis: Static analysis, vulnerability scanning Supply Chain Security: SLSA Level 3 compliance, SBOM implementation |
Development teams seeking to embed security without slowing innovation |
Category | Services | Value |
---|---|---|
๐ Compliance & Regulatory |
Regulatory Compliance: GDPR, NIS2, ISO 27001 implementation ISMS Design & Implementation: Information Security Management Systems AI Governance: Emerging AI risk management frameworks Audit Preparation: Documentation and evidence preparation |
Navigate complex regulatory landscapes with confidence |
๐ Open Source Security |
Open Source Program Office: OSPO establishment and management Vulnerability Management: Open source risk assessment and remediation Security Tool Development: Custom security solutions and automation Community Engagement: Open source security best practices |
Leverage open source securely while contributing to security transparency |
๐ Security Culture & Training |
Security Awareness Programs: Building organization-wide security culture Developer Security Training: Secure coding practices and methodologies Leadership Security Briefings: Executive-level security understanding Incident Response Training: Preparedness and response capability building |
Transform security from barrier to enabler through education and culture |
Three decades of hands-on experience in software development and security architecture means we understand the real challenges development teams face. We don't just point out problemsโwe provide practical, implementable solutions that enhance security without slowing down innovation.
Our approach: Security should be seamlessly integrated into your existing processes, not bolted on afterward. We help organizations build a culture of security awareness where protection becomes a natural part of how teams work, not an obstacle to overcome.
Passionate about transparency: As advocates for open source security, we believe in sharing knowledge and building community. Our solutions are designed to be understandable, maintainable, and aligned with industry best practices.
CEO/Founder of Hack23 AB (founded 2025), James is an experienced security professional with over 30 years in information technology, specializing in security architecture, cloud security, and compliance. Strong advocate for transparency in organizations, secure software development practices, and innovative open source solutions.
Professional Background:
- Current Role: CEO/Founder Hack23 AB (Jun 2025-Present), Application Security Officer at Stena Group IT (Oct 2024-Present)
- Previous Roles: Information Security Officer at Polestar (Mar 2022-Sep 2024), Senior Security Architect at WirelessCar (Jan 2018-Mar 2022)
- Certifications: CISSP, CISM, AWS Security Specialty, AWS Solutions Architect Professional
- Expertise: Security Architecture, Cloud Security, DevSecOps Integration, Open Source Security, Compliance Management
Company Information:
- Company: Hack23 AB
- Registration Number: 5595347807
- Country: Sweden
- Founded: 2025
- Industry: Cybersecurity Consulting & Gaming Innovation
- Copyright: James Pether Sรถrling 2008-2025
Career Highlights:
- Founded Hack23 AB in 2025 as Swedish Innovation Hub for cybersecurity and gaming
- Led Open Source Program Office at Polestar (2022-2024)
- Senior Security Architect at WirelessCar supporting secure delivery practices (2018-2022)
- Consultant roles at Omegapoint (2018) and Consid AB (2017-2018) focusing on open source development
- Cloud Architect at Keypasco developing cloud security solutions (2010-2017)
- Early career includes positions at Sky, Glu Mobile, Volantis Systems (London), and system administration roles
- Military service as NBC-Defence Group Leader in Swedish Armed Forces (1996-1997)
- Speaker at Javaforum Gรถteborg on secure architecture patterns
- Guest on "Shift Left Like A Boss" security podcast
- Featured in Computer Sweden and National Democratic Institute reports
Martial Arts Background:
- 1999: Black Belt Song Moo Kwan Korea - Traditional Taekwondo certification
- 2024: 3rd Dan Kukkiwon - World Taekwondo Headquarters certification
- Teaching Experience: Taekwondo instructor at multiple clubs (1994-2017) including Tor Taekwondo klub, Haga Taekwondo club, and Hworangi Taekwondo
- Cultural Integration: Deep understanding of Korean martial arts traditions directly influences the authentic techniques and educational value in Black Trigram
Core Expertise Areas:
- Security Architecture & Strategy: Enterprise security frameworks, risk assessment, policy development, AI governance
- Cloud Security & DevSecOps: AWS Advanced, multi-cloud strategies, Infrastructure as Code security, CI/CD integration
- Secure Development: SSDLC implementation, code quality analysis, supply chain security, SLSA Level 3 compliance
- Compliance & Governance: ISMS design, regulatory compliance (GDPR, NIS2, ISO 27001), audit preparation
- Open Source Security: OSPO leadership, vulnerability management, security tool development, community engagement
- Security Culture & Training: Organization-wide awareness programs, developer training, incident response capability building
Technology & Skills:
- Security & Compliance: Security Architecture, Risk Management, ISO 27001, NIST 800-53, GDPR, CIS Controls, Vulnerability Management, Incident Response, SSDLC, AI Governance
- Cloud & Infrastructure: AWS (Advanced), Microsoft Azure, CloudFormation, Terraform, Docker, Linux/Unix, Security Hub, GuardDuty, Solution Architecture
- Development & DevOps: Java/Spring, TypeScript/JavaScript/React, PostgreSQL, SonarQube, GitHub Actions, Jenkins, ElasticSearch, OWASP ZAP, SLSA Level 3
- Leadership & Management: Information Security Management, Team Leadership, Policy Development, Open Source Program Office, Strategic Planning, Six Sigma Black Belt
Links:
- Company LinkedIn: https://www.linkedin.com/company/hack23/
- Company Registration: Allabolag.se
- Personal LinkedIn: James Pether Sรถrling
- OpenHub Profile: https://www.openhub.net/accounts/pether
- Computer Sweden: Technology that reveals politicians
- Riksdag och Departement: CIA keeps track of parliament members
- National Democratic Institute: Parliamentary Monitoring Organizations Survey
๐ฅ ์ด๋ ์ ๋ฌด์๋ก ์๋ฒฝํ ์ผ๊ฒฉ์ ์ถ๊ตฌํ๋ผ - "Master the dark arts through the pursuit of the perfect strike"
๐ฅ Flagship Project - A realistic 2D precision combat simulator inspired by traditional Korean martial arts, emphasizing anatomical targeting, realistic physics, and authentic techniques across 5 distinct fighter archetypes.
Key Features:
- 70 Anatomical Vital Points: Strategic targeting system based on traditional Korean martial arts knowledge (๊ธ์๊ฒฉ)
- 5 Unique Player Archetypes: Musa (๋ฌด์ฌ), Amsalja (์์ด์), Hacker, Intelligence Operative, Organized Crime
- Authentic Korean Martial Arts: Traditional techniques including Taekkyeon, Hapkido, and historical combat methods
- Realistic Combat Physics: Advanced trauma simulation and realistic damage modeling with authentic body mechanics
- Educational Gameplay: Combines traditional philosophy with modern game mechanics for cultural learning
- Precision Combat System: Emphasis on timing, positioning, and anatomical knowledge for tactical advantage
- Cultural Authenticity: Deep integration of Korean martial arts philosophy and terminology with respectful representation
Technical Specifications:
- Built with Rust for maximum performance and memory safety
- Cross-platform compatibility (Windows, macOS, Linux)
- Modern graphics rendering with realistic physics simulation
- Comprehensive testing with high code coverage
- Supply chain security with SLSA Level 3 compliance and OpenSSF best practices
Links:
- ๐ฎ Play Now
- ๐ Documentation
- โญ Features
- ๐พ GitHub Repository
A comprehensive security assessment platform for the CIA triad (Confidentiality, Integrity, Availability) with business impact analysis, compliance mapping to regulatory frameworks like NIST, ISO, GDPR, and cost estimation features.
Key Features:
- Security level assessment across CIA triad dimensions
- Compliance mapping to major frameworks (NIST, ISO, GDPR, HIPAA, SOC2, PCI DSS)
- Business impact analysis and cost estimation
- Interactive visualizations and implementation guidance
Links:
- ๐ Launch Application
- ๐ Documentation
- โญ Features
- ๐พ GitHub Repository
A volunteer-driven open source intelligence (OSINT) project providing comprehensive analysis of political activities in Sweden. Through advanced monitoring of key political figures and institutions, it delivers financial performance metrics, risk assessment analysis, political trend analysis, politician ranking systems, performance comparisons, and transparency insights.
Key Features:
- Interactive dashboards for political activity visualization
- Political scoreboard systems and performance rankings
- Critical analysis tools for political trends and voting patterns
- Transparency metrics and accountability measures
- Data-driven insights from authoritative Swedish government sources
Links:
- ๐ Documentation
- โญ Features
- ๐พ GitHub Repository
A multi-region active/active website leveraging AWS Resilience Hub policy compliance and runbooks for rapid recovery from failures and high availability. Demonstrates cloud architecture best practices for availability and resilience.
Links:
- ๐พ GitHub Repository
SonarQube plugin for analyzing AWS CloudFormation templates with security best practices based on NIST, CWE, and ISO standards. Integrates CFN-nag static analysis capabilities into SonarQube for enhanced infrastructure as code security scanning.
Links:
- ๐พ GitHub Repository
- ๐ฆ Maven Central