Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Dec Newsletter. Never Trust an Elf, Always Verify

It’s been a year since we debated if Santa is an insider threat. For this festive newsletter, I’m going to be following up with how to wrangle in the elves. Historically Santa elves are known for their workshop skills, putting together cute wood toys and sewing holiday stockings. Fast forward to the 21st century and the skills required to be a modern elf have exploded.

Top 12 Container Scanning Tools for 2025

Kubernetes is a revolutionary technology for orchestrating containerized applications, enabling organizations to deploy and manage applications efficiently. Containers’ portability, scalability, and agility have transformed software development and deployment. However, these benefits come with significant security challenges, including risks associated with vulnerabilities in container images and potential misconfigurations.

How to Build a Discord Bot in 16 Minutes (Part 2)

This is the second video of our series 'How to Build a Discord Bot'. In this video, we will be learning about what Wordle is and how it works as well as building out the logic for the bot and testing it out. Stay tuned for the next video where we start using a database to store the Wordle results! Each video will be published one week from the previous.

4 Security Controls Keeping Up with the Evolution of IT Environments

The rapid adoption of cloud technology in the past few years has transformed IT environments, enabling unprecedented opportunities for flexibility, scalability, and collaboration. However, this transformation has introduced a potentially dangerous level of complexity into these environments – recent research from PwC revealed that 75% of executives report too much complexity in their organizations, leading to ‘concerning’ cyber and privacy risks.

X Display Manager Control Protocol (XDMCP) Explained

X Display Manager Control Protocol (XDMCP) is a remote desktop protocol using X11 environments for managing remote graphical login sessions in Linux and Unix systems. Specifically, it allows X display managers to interface with X terminals or other X server-based systems, by facilitating the remote display management process. It operates by sending a query packet from a client to a server, signaling the request to start a session.

Policy as Code: The Future of Authorization & Access Control - Sasha Klizhentas at Teleport Connect

Join Sasha Klizhentas, CTO of Teleport, as he discusses the critical challenges in authorization and access control, and introduces an innovative approach using policy as code. Learn how this new methodology can help prevent misconfigurations that lead to data breaches, and see a live demo of Teleport's new policy as code features with Dave Sudia. In this talk, you'll discover.

Enhancing Your Teleport Experience with Kenneth Roraback

Join a dynamic workshop session from Teleport Connect where users and team members collaborate to shape the future of Teleport. This interactive session captures real user feedback about current frustrations and desired features for 2025 and beyond, using a structured brainstorming approach with color-coded post-its and group discussions. In this session, you'll see: Key themes that emerged: Chapters.