Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Use MCP Servers with Claude Desktop | Real-Time AI Integration

In this video, I walk you through the basics of getting started with MCP servers using Claude Desktop as the client. Whether you're new to MCP servers or just looking for a smooth way to connect and explore, this step-by-step guide will help you get up and running in no time!

Teleport Secures Model Context Protocol, Unleashing AI Innovation focused on Large Language Model (LLM) Interactions with Infrastructure Data

Teleport announces support for securing the Model Context Protocol (MCP), enabling organizations to secure interactions between Large Language Models (LLMs) and their workloads and data. By leveraging the Teleport Infrastructure Identity Platform's support for MCP, companies can now safely harness cutting-edge AI, leveraging the same trust architecture from Teleport that enables human and non-human identities to securely interact with cloud workloads and with each other.

Best Practices for Using ionCube Encoder in CI/CD Pipelines

With the growing adoption of automated build pipelines, the ionCube Encoder CI Edition offers a tailored solution for developers needing flexible, temporary machine licensing within their CI/CD workflows. The CI Edition is ideal for use in ephemeral environments like Docker containers or cloud-based runners, allowing encoding operations to occur seamlessly as part of your integration process. If you’re not yet familiar with this product, our FAQ entry provides a concise overview.

What are CIS Benchmarks and how to use them?

A list of 18 procedures (reduced from 20), or “controls,” recommended by the Center for Internet Security (CIS), must be followed to build an IT infrastructure resistant to cyberattacks. The CIS 4th Control advises to establish and maintain a secure configuration process for enterprise assets (end-user devices, including portable and mobile; non-computing/IoT devices; and servers) and software (operating systems and applications) (4.1).

ARMO vs. Wiz: Bridging the Gap in Cloud Runtime Security

The recent news about Google’s multi-billion-dollar acquisition of Wiz has sparked widespread conversation across the cybersecurity world. Its price tag reflects its strong reputation, Wiz is a leader in Cloud Security Posture Management (CSPM) solution. Its strength lies in identifying potential risks before they impact your live environment.

Introducing Mend's Integration with Microsoft Defender for Cloud

We’re excited to announce a powerful new integration between Mend.io and Microsoft Defender for Cloud (MDC)—a step forward in our mission to bring intelligent, actionable, and context-rich open source security directly into the cloud security workflow. As organizations embrace cloud-native architectures, security teams face the growing challenge of identifying and prioritizing the open source software risks that truly matter.

Selective Backup & Restore for KubeVirt VMs

Easily protect your virtual machines running on KubeVirt, Red Hat OpenShift Virtualization, or SUSE Virtualization (Harvester) with CloudCasa! This video shows how to perform selective backup and restore of VMs inside your Kubernetes environment with just a few clicks. Whether you're managing critical workloads or large-scale clusters, CloudCasa gives you granular control to protect only what matters — and recover fast. Compatible with modern K8s virtualization platforms, CloudCasa makes VM-level protection simple and powerful.