Top 10 Hacks of the Past Decade

In 1971, when employees booted up their PDP-10 mainframe computers, they found a peculiar message waiting for them at the teletype console. “I’m the creeper: catch me if you can.” This mysterious message was found at multiple stations throughout the BBN Technologies headquarters. What researchers were witnessing was the spread of the very first computer virus, a worm called Creeper.

Loading...
Top 10 Hacks of the Past Decade report cover

Download the PDF to learn:

The implications of the top 10 security hacks

The role of the cybersecurity industry

How Teleport could have changed the results

Clients

Trusted by leading organizations

  • Audit and recorded sessions in Teleport give us an understanding of exactly what was happening at any given moment. This is incredibly critical from a security and compliance perspective.

    Mario Loria

    Senior Site Reliability Engineer II, Carta

  • Teleport allows us to comply with the regulatory hurdles that come with running an international stock exchange. The use of bastion hosts, integration with our identity service and auditing capabilities give us a compliant way to access our internal infrastructure.

    Brendan Germain

    Systems Reliability Engineer, Nasdaq

  • Teleport has made obtaining a FedRAMP-Moderate ATO that much more achievable via their FIPS 140-2 endpoints, ease in integration with our SSO and MFA , and the view into audit logs of remote connection sessions provide the appropriate insight for Continuous Monitoring.

    Jeff Gill

    Senior Director of Engineering, SumoLogic

  • We were looking for a simplified way to be able to package up the Kubernetes infrastructure – to be able to set it up, to manage it, provide all the underlying tool sets – so we picked a partner that knows how to do this. It’s a build versus buy decision; we decided to go with people where Kubernetes is their core competency.

    Krishnan Aghoramurthy

    VP Engineering Operations, Anaconda