Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Elevate Infrastructure Resiliency and Engineering Velocity with Infrastructure Identity

Speakers: Jack Poller, Principal Analyst at Paradigm Technica Ev Kontsevoy, CEO & Co-Founder at Teleport The Identity Attack Era: Is Your Infrastructure Secure? Cyberattacks are evolving, and identity compromise is now the primary tactic used by adversaries to infiltrate organizations. With credential theft, phishing, and social engineering driving most breaches, traditional security measures struggle to keep up. At the same time, the complexity and scale of modern infrastructure—spanning distributed systems, multi-cloud access, and AI-driven operations—have vastly expanded the attack surface.

Erik Zaadi - Platform Engineering to the Rescue: Making DevSecOps Work for Everyone | DevSecNext

How can organizations make DevSecOps accessible and effective for every team? Platform Engineering is the answer. In this talk, Erik explores how developer portals and golden paths help streamline security, automate remediation, and create scalable, secure development workflows without adding friction. This talk was recorded at DevSecNext, a community-driven event reimagining how we share security insights—short, to the point, and packed with actionable takeaways.

How to Set Up and Use the CloudCasa Rancher Extension for Effective Kubernetes Backup

Join Pawel Staniec, CTO of Catalogic Software, in this detailed demonstration on how to install and utilize the CloudCasa Rancher extension for seamless Kubernetes backup and recovery. T his video guides you through configuring your API key, deploying the CloudCasa agent, and managing backups directly from your Rancher or Rancher Prime dashboard. Whether you're a seasoned admin or new to Kubernetes, this tutorial ensures your data is protected efficiently and effectively.

UNC Path Hardening Quick Knowledge Guide

UNC paths allow Windows systems to access shared network resources, but they can also be a target for cyberattacks if not properly secured. In this video, we break down the Hardened UNC Path policy—a crucial security feature that enforces mutual authentication and integrity checks on critical shares like NETLOGON and SYSVOL. You'll learn: How the Hardened UNC Path policy works Step-by-step setup using Group Policy and registry keys How SMB encryption can add extra security (and its compatibility risks)

Application Packaging Services vs. In-House Packaging: What's Right for You?

Should you perform in-house packaging or use application packaging services? Obviously, both options have their pros and cons. It always comes down to your requirements, expectations, but also deadlines and other factors. In many cases, app packaging services tend to be quicker, however there are still many companies that go for in-house packaging because they already have that system in place and set up correctly.

Make PostgreSQL Access Easier and More Secure with Teleport

Managing PostgreSQL access is a pain for engineering teams. Setting up users, roles, and keeping track of permissions slows down engineers. Security risks may emerge in the form of shared admin accounts or missteps in user setup or authorization workflows. Check out this screenshot from a Reddit thread discussing this problem.

How Ditching RSA Made Teleport 77% More CPU-Efficient

In Teleport 17 we made the switch from RSA to ECDSA and Ed25519, and it paid off with improved security and significant performance benefits. This was a major undertaking; Teleport has used 2048-bit RSA keys for just about everything since our initial release. Switching to new key types and signature algorithms came with serious compatibility concerns given the broad range of environments Teleport is deployed in and the number of third party tools that use or trust Teleport-issued certificates.