Article & News

Teleport Blog

Articles by topic cybersecurity

  • OAuth 2.0
    Apr 25, 2022
    By Virag Mody
    OAuth provides third party applications limited access to user resources without compromising the user's data. Find out exactly how in this blog.
  • Why SSO Sucks
    Mar 11, 2022
    By Ben Arent
    A deep dive into the UX of current single sign-on and an overview of possible solutions.
  • Ghosts of Past Employees
    Oct 28, 2021
    By Ben Arent
    Are you sure you've revoked all the credentials for the summer intern? This is a fun seasonal deep-dive into what we can learn from Halloween ceremonies.
  • Jul 12, 2021
    By Shuo Yang
    When talking about application authorizations, we often encounter two concepts RBAC (role-based access control) and ABAC (attribute-based access control).
  • Jun 30, 2021
    By Sakshyam Shah
    MySQL brands itself as the world's most popular open source database. It has a corpus of tools and tutorials to automate MySQL, SQL injection and a notorious list of past vulnerabilities; as popular as MySQL database is among developers and SQL enthusiasts, it is equally popular among hackers.

Additional articles