Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Teleport: Introducing Teleport 5.0!

Many engineering systems are difficult to access because they are buried behind firewalls and VPCs, and users must be connected via LANs or by VPN to be able to use them. Even with all these measures, however, they do not meet security requirements of standards such as SOC2, PCI, or FedRAMP, because they may lack authentication, authorization, logging and auditability. The complexity of setup and administration further intensifies the problem, leading to technical users taking shortcuts such as exposing an application through a direct endpoint, relying on secrecy or simple credentials, and bypassing enterprise security standards.

Teleport: Secure access to web applications & RESTful APIs with Teleport Application Access

Are you nervous about web applications exposed to the public Internet? Would your users revolt if they had to use a VPN every time they viewed a dashboard? It's a headache to secure access to internal apps and dashboards while simultaneously maintaining ease of use, granular access policies, and visibility for audits and compliance! Join us in this webinar to learn how Teleport Application Access can help you to.

Teleport: Secure Access to MongoDB Databases with Teleport Database Access

MongoDB is one of the most popular open-source databases. This makes it both an easy choice for teams of any size and a prime target for hackers. In the past couple of years alone, there's been a number of hacks involving thousands of open and unprotected MongoDB deployments - many of which could have been easily prevented by following a standard set of security best practices and using products like Teleport to control access.

Teleport: Sharpen your security skills with open source! Introduction to modern infrastructure access.

Secure access to complex computing environments is hard to get right. Introducing the open source identity-aware access plane: Teleport. It is used by engineers at smart companies like Nasdaq and Google, to easily access all of their computing resources - SSH servers, Kubernetes clusters, or databases. For security professionals, Teleport uses short-lived certificates, audit logs, and session recordings to make it easier to achieve high security standards and compliance.

Forward Networks: Forward Fix Live: Enhance Cloud Security Posture Management with Visualization and Verification

Trying to make sense of your cloud security posture shouldn't mean flipping between multiple screens and inferring how traffic is behaving. Join this live event to see how you can monitor and verify your security posture across multiple clouds on a single screen. Forward Fix Live host, Derick Winkworth (@cloudtoad), and Technical Solutions Architect, Craig Johnson (@fracticated), will demonstrate how our customers use the Forward Networks platform to manage their cloud security posture.