Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2021

Sharpen your security skills with open source! Introduction to modern infrastructure access

Secure access to complex computing environments is hard to get right. Introducing the open source identity-aware access proxy: Teleport. It is used by engineers at smart companies Nasdaq and Google, to easily access all to their computing resources — SSH servers, Kubernetes clusters, or databases. For security professionals, Teleport uses short-lived certificates, audit logs, and session recordings to make it easier to achieve high security standards and compliance.

An Engineer's Perspective on Onboarding

Before I joined the security industry, I was an end user. Coming in with that first-hand experience equips me to talk about secure remote access from multiple perspectives: as a vendor and as a practitioner. This lets me see the technologies available and also understand the drivers and issues engineering orgs face adopting them, particularly with onboarding engineers. I’ve been a support engineer for over 20 years, across Operations and System & Database Administration.

Running IT at a Hyper Growth Startup

At Teleport we do IT a little differently — supporting a global remote company in hypergrowth is no easy feat and the playbook is different from traditional IT work. In this article, we want to share some of our IT philosophies that enable our employees to keep their agility despite working very asynchronously around the world.

When should a startup call the FBI

For this 11th episode of Access Control Podcast, a podcast providing practical security advice for startups, Developer Relations Engineer at Teleport Ben Arent chats with Elvis Chan. Elvis is Assistant Special Agent in charge assigned to the San Francisco FBI Field office. Chan manages a squad responsible for investigating national security cyber matters and has over 14 years of experience in the bureau.

Applying Least Privilege in Kubernetes II Jonathan Canada

Scalability and Cloud-Native have driven the demand for Kubernetes, but the developer now has the harder task of building applications in a secure manner. This talk will focus on best practices for implementing least privilege and enforcing zero trust principles within Kubernetes clusters. A how-to for implementing robust Role Based Access Control (RBAC) tied into the corporate SSO/Identity provider using Teleport.

Low Latency Identity-aware Access Proxy in Multiple Regions

A multi-protocol access proxy is a powerful concept for securing access to infrastructure. But accessing numerous computing resources distributed across the globe via a single endpoint presents a latency challenge. Today we are announcing that the hosted edition of Teleport Access Plane is now available in 5 regions all over the world.