Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Governing the Future: Federal Cybersecurity in the Age of Edge and AI

Intel's CTO on Navigating Cybersecurity, AI, and the Edge Governing the Future: Federal Cybersecurity in the Age of Edge and AI In this episode of the "Trusted Tech for Critical Missions" podcast, host Ben Arent interviews Steve Orrin, Chief Technology Officer at Intel Federal, about the evolving landscape of federal cybersecurity in the age of edge computing and artificial intelligence. Key Takeaways.

Teleport delivers "crown jewel observability" with access control monitoring for critical infrastructure resources

New updates to Teleport Policy enable security professionals to cut through the noise of alert fatigue, with "Crown Jewel" tagging and monitoring for access variances in critical resources.

How to Use Teleport Machine ID and GitHub Actions to Deploy to Kubernetes Without Shared Secrets

We are living in the era of Kubernetes. It is hard to find anyone who has not heard of it and in all likelihood you are using it, too. And if you are using Kubernetes, it is probably also safe to assume that you areusing CI/CD to deploy your applications into it. However, as CI/CD and Kubernetes have grown in popularity, the number of bad actors looking to exploit weaknesses in them has grown too.

New Features in Teleport Policy provide more insight into infrastructure policy risks

As modern organizations grow in size and complexity, managing secure access to computing infrastructure becomes a top priority. Teleport has introduced new features in Teleport Policy 16 aimed at making this easier and more efficient. With these enhancements, organizations can take a more proactive approach to security, ensuring better oversight and reducing potential risks.

Kubernetes Namespace Restriction and Separation

Teleport provides a secure and scalable solution for managing namespace separation in Kubernetes clusters, streamlining compliance, and enabling financial institutions to maintain both resiliency and agility. Kubernetes has rapidly evolved from a tech buzzword to an indispensable backbone of modern infrastructure in the financial services industry — redefining how institutions scale, secure, and deliver their most critical applications.

Navigating Access Challenges in Kubernetes-Based Infrastructure

Organizations often find that as they deploy their K8S infrastructure into production and across their company, what worked well for managing access during development does not scale efficiently. Research shows that this often leads to serious security risks including breaches. So, new access challenges emerge, particularly as teams scale. Join us for a 30-minute deep dive into how to secure access to Kubernetes-based environments including clusters, databases, and applications in a scalable way.

How to Implement Scalable Access Controls with RBAC: Best Practices for Zero Trust Environments

In the arms race to secure environments, codifying permissions often becomes an afterthought in the wake of setting up a new access tool. I often speak with organizations that either don’t know who has permission to what, or have no permission definitions at all. I once onboarded an enterprise level digital communications company that was losing productivity trying to keep track of who had access to their Kubernetes resources.

Securing Infrastructure in Healthcare: Reducing Breaches and Building Resiliency

Telehealth and remote patient monitoring solutions enable healthcare providers to deliver care beyond traditional clinical settings. However, developing and deploying these digital healthcare solutions involves navigating complex challenges, particularly regarding data privacy and regulatory compliance. Ensuring adherence to HIPAA regulations while securely managing remote infrastructure adds layers of complexity for healthcare IT, security, and engineering teams.

How to Keep an Identity Attack from Compromising your Infrastructure

Identity Platforms (IdP) provide organizations with incredible convenience with Single Sign-On (SSO). However, if IdPs are compromised, the ‘keys to the castle’ can be left vulnerable, making the rest of the organization’s infrastructure vulnerable as well.