Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

SSH connection resumption

SSH connection resumption Teleport v15 introduces automatic SSH connection resumption if the network path between the client and the Teleport node is interrupted due to connectivity issues, and transparent connection migration if the control plane is gracefully upgraded. The feature is active by default when a v15 client (tsh, OpenSSH or PuTTY configured by tsh config, or Teleport Connect) connects to a v15 Teleport node.

SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises

In today's interconnected digital ecosystem, businesses are constantly seeking efficient and secure solutions to manage user authentication across multiple applications and domains. Identity Federation and Single Sign-On (SSO) stand out as two prominent approaches, each offering distinct advantages and use cases. Let's explore the differences between Identity Federation and SSO, their benefits, and how they address the evolving needs of enterprises.

How is a Container Scan Done?

Containers offer many benefits, including lightweight portability from one environment to another, but they add a layer of complexity to application security that can introduce additional risks. There are many ways a container can become vulnerable to attack: through its source code, how the container is built, how the container is configured, how it secures secrets, and how it interacts with the host and other containers. Each of these avenues has its own security solutions and best practices.

Okta & SCIM Integration with Teleport 15

Join Trent as he introduces the groundbreaking integration of Okta and SCIM with Teleport 15, enhancing identity management and system provisioning. In this comprehensive guide, we delve into how SCIM (System for Cross-domain Identity Management) simplifies the provisioning of users and resources across system boundaries, eliminating the need for ad-hoc mechanisms like webhooks.

New Desktop Access Improvements in Teleport 15

Dive into the essential desktop access enhancements with Teleport 15 in this quick overview. Learn about the performance boosts and user interface improvements that make accessing desktops smoother and more intuitive. Upgrading your Teleport components is key to unlocking these benefits, ensuring a seamless and secure connection experience. What's New.

New features in Teleport Connect 15

In this insightful video, we explore the latest enhancements to desktop access in Teleport 15, showcasing how these improvements significantly boost performance and usability. With Teleport 15 deployed, we dive into the critical updates, including the necessity of upgrading your Teleport proxy, auth server, and Windows agent to leverage the full potential of these advancements.

Introducing Runtime-based Vulnerability Management - turning vulnerability data into actionable intelligence

Struggling to manage vulnerabilities in your Kubernetes environment? You’re not alone. Traditional vulnerability management tools often leave security teams feeling overwhelmed and unsure of where to focus their efforts. Traditional scanners churn out an endless stream of alerts, many irrelevant, making it difficult to prioritize and address the most critical issues. Sound familiar?