Articles by topic security
- Mar 25, 2021By Russell JonesUnderstanding Cross-Site Request Forgery (CSRF) and its Mitigations.
- Mar 4, 2021By Alexander KlizhentasMaking sense of authorization, policy and access management systems.
- Feb 23, 2021By Russell JonesUnderstanding Cross-Site Scripting (XSS) and Its Mitigations.
- Feb 18, 2021By Alexander KlizhentasHow to deploy SSH certificates in production to make security better, not worse.
- Jan 25, 2021By Ev KontsevoyWhat is a microservice? What is Kubernetes for? In this post, we try to explain microservices, containers and Kubernetes in 10 minutes
- Jan 13, 2021By Virag ModyManaging shell level access access is difficult enough when you know your users. So how do you implement secure access to a revolving door of users?
- Dec 10, 2020By Virag ModyUnify identity access controls across the entire stack with a single place to define, enforce, view, and manage global authorization.
- Nov 11, 2020By Virag ModyThe Twitter hack was not orchestrated by a sophisticated operation coordinated by a nation state. Twitter was hacked by an average teenager who was too young to have his own license.
- Sep 10, 2020By Virag ModyThis paper talks about how companies can secure infrastructure access by basing decisions on identity, not trusting private networks, and centralizing auditing/monitoring.
- Aug 6, 2020By Virag ModyWhat is OIDC? This blog post compares two common authentication methods (OIDC and SAML) and discusses how OIDC works in relation to OAuth.
- Jul 29, 2020By Travis GaryIn this blog post we aim to provide some clarity on what SOC 2 is, what to expect from the certification process based on our own experiences preparing for our Teleport Cloud launch
- Jun 3, 2020By Kevin NisbetCompare Zero Trust with “traditional” network security models focusing on the access portions of networks
- May 20, 2020By Dmitri SheleninLearn how we built SELinux support for Gravity 7.0, issues we had, and useful tips. Also learn how we are confining Kubernetes services and workloads.
- May 6, 2020By Ev KontsevoyHow SaaS companies approach the trade-off between having solid cloud infrastructure security and upsetting their own engineers by overdoing it
- Apr 30, 2020By Ben ArentYou can SSH into self-driving robots using a reverse SSH tunnel, but this method only scales so far, and it requires more than 50 steps to set up.
- Apr 23, 2020By Virag ModyEvolution from perimeter based security to Zero Trust security - how it protects modern organizations, remote workforces, and web applications.
- Mar 17, 2020By Steven MartinThe Zero Trust approach to SSH and security is based not on where you are, but who you are, making it possible to access resources in cloud-native, hybrid cloud, or legacy environments securely.
- Feb 27, 2020By Russell JonesTeleport’s Enhanced Session Recording feature can add vital extra visibility into commands being run on your systems.
- Feb 25, 2020By Russell Jones, Kevin NisbetResults and independent analysis from a third party on the Teleport project.
- Oct 21, 2019By Jordan MarinMost monitoring tools are great for a high-level view of how your applications and infrastructure are performing, but have many gaps when it comes to security. In this blog, we look at two areas where visibility is typically lacking:\ SSH and Kubernetes.
- Jul 16, 2019By Jon SilversHow are some big, well-known companies approaching SSH? We took a look at three who are setting an example for others to follow.
- Jun 18, 2019By Jon SilversToday we’re announcing a new milestone with Teleport 4.0 - IoT Security, FedRAMP Support
- May 30, 2019By Kevin NisbetDiscussion on Wormhole - networking plugin for Kubernetes. How do Kubernetes solutions trust the underlying network? - What about WireGuard/Wormhole?
- Apr 29, 2019By Kevin NisbetWe are excited to announce the new open source project: Teleport Wormhole, a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.
- Mar 13, 2019By Russell JonesHow to restrict SSH sessions to specific commands? How to have a restricted shell for some users? In this article we cover some common ways to answer these questions.