Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top Use Cases & Trends in Machine & Workload Identity

Speakers: As infrastructure becomes increasingly automated, the systems that deploy, manage, and scale it—CI/CD pipelines, service agents, orchestration tools—rely on a growing class of non-human identities (NHIs). These machine actors often operate with persistent credentials, excessive privileges, and limited visibility—leaving critical trust gaps in modern environments. This session explores three high-impact use cases where addressing NHI is both urgent and achievable.

Workload Identity Meets Supply Chain Security: Teleport's Sigstore Integration

It’s no secret that the software development life cycle is becoming more complex. With a plethora of libraries, frameworks, and now AI coding agents and assistants, we can build far more ambitious software in a fraction of the time. This is fantastic! But with it come greater opportunities for accidental or malicious security bugs and vulnerabilities to sneak in undetected, with potentially devastating consequences for your users and their trust in your company.

Your Infrastructure Has a Non-Human Trust Problem

Modern infrastructure is increasingly run by automated systems, not people. Bots push code. Runners deploy to prod. Agents orchestrate cloud resources. And increasingly, AI models trigger actions directly through prompt-driven automation. Welcome to the era of non-human identities (NHIs): the invisible workforce operating behind modern digital systems.

Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD

Back in 2024, Amazon Web Services (AWS) engaged Trail of Bits (ToB) to perform a comparative assessment between several authorization and access management policy languages. If you're unfamiliar with the concept of a policy engine, it's essentially a fully-featured engine that offloads authorization decisions in an application.

How to Secure MCP Servers | A Walkthrough

While the hype continues to build around MCP, or model context protocol, a growing number of engineers and organizations are becoming concerned about the potential security risks that MCP invites. In this video, I'll give a demo of how Teleport provides secure access to your MCP servers and how the new Teleport Secure MCP integration gives you a robust solution for protecting your LLM endpoints and data sources.