Top 10 Hacks of the Past Decade
In 1971, when employees booted up their PDP-10 mainframe computers, they found a peculiar message waiting for them at the teletype console. “I’m the creeper: catch me if you can.” This mysterious message was found at multiple stations throughout the BBN Technologies headquarters. What researchers were witnessing was the spread of the very first computer virus, a worm called Creeper.
Download the PDF to learn:
The implications of the top 10 security hacks
The role of the cybersecurity industry
How Teleport could have changed the results
Clients
Trusted by leading organizations
Audit and recorded sessions in Teleport give us an understanding of exactly what was happening at any given moment. This is incredibly critical from a security and compliance perspective.
Mario Loria
Senior Site Reliability Engineer II, Carta
Teleport allows us to comply with the regulatory hurdles that come with running an international stock exchange. The use of bastion hosts, integration with our identity service and auditing capabilities give us a compliant way to access our internal infrastructure.
Brendan Germain
Systems Reliability Engineer, Nasdaq
Teleport has made obtaining a FedRAMP-Moderate ATO that much more achievable via their FIPS 140-2 endpoints, ease in integration with our SSO and MFA , and the view into audit logs of remote connection sessions provide the appropriate insight for Continuous Monitoring.
Jeff Gill
Senior Director of Engineering, SumoLogic