Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Crypto Companies Can Break the Breach Cycle

In February of 2025, North Korean state-backed cybercriminals stole over $1.9 billion from a popular crypto exchange. That's a mind-boggling amount of money, let alone from a breach. But here's the craziest part; it was excruciatingly simple. In short, it went down like this: an engineer was phished, attackers located static API keys — and just like that, attackers had direct access to critical cloud resources. Static credentials strike again.

Elevate Infrastructure Resiliency and Engineering Velocity with Infrastructure Identity

Speakers: Jack Poller, Principal Analyst at Paradigm Technica Ev Kontsevoy, CEO & Co-Founder at Teleport The Identity Attack Era: Is Your Infrastructure Secure? Cyberattacks are evolving, and identity compromise is now the primary tactic used by adversaries to infiltrate organizations. With credential theft, phishing, and social engineering driving most breaches, traditional security measures struggle to keep up. At the same time, the complexity and scale of modern infrastructure—spanning distributed systems, multi-cloud access, and AI-driven operations—have vastly expanded the attack surface.

Make PostgreSQL Access Easier and More Secure with Teleport

Managing PostgreSQL access is a pain for engineering teams. Setting up users, roles, and keeping track of permissions slows down engineers. Security risks may emerge in the form of shared admin accounts or missteps in user setup or authorization workflows. Check out this screenshot from a Reddit thread discussing this problem.

How Ditching RSA Made Teleport 77% More CPU-Efficient

In Teleport 17 we made the switch from RSA to ECDSA and Ed25519, and it paid off with improved security and significant performance benefits. This was a major undertaking; Teleport has used 2048-bit RSA keys for just about everything since our initial release. Switching to new key types and signature algorithms came with serious compatibility concerns given the broad range of environments Teleport is deployed in and the number of third party tools that use or trust Teleport-issued certificates.

Recap: Experience Frictionless Access Without Sacrificing Security

“We need to get stuff done – but I’m not supposed to let you.” Shipping high priority code, meeting tight release deadlines, fighting incident fires —there are countless reasons why today's engineering teams need to move at lightspeed. This need for speed may put them at odds with security objectives.