Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Missing Link Between Infrastructure Resiliency and High-Velocity Engineering

Attackers are not just targeting your people. They have their sights set on your infrastructure, too. That's why identities (not perimeters) are the new attack surface. In our latest webinar, Ev Kontsevoy, CEO of Teleport, and Jack Poller, Principal Analyst at Paradigm Technica, break down why traditional identity and access approaches are insufficient to support resiliency in modern computing environments as attack surfaces increase and identity volumes explode. Their conclusion is clear.

How Crypto Companies Can Break the Breach Cycle

In February of 2025, North Korean state-backed cybercriminals stole over $1.9 billion from a popular crypto exchange. That's a mind-boggling amount of money, let alone from a breach. But here's the craziest part; it was excruciatingly simple. In short, it went down like this: an engineer was phished, attackers located static API keys — and just like that, attackers had direct access to critical cloud resources. Static credentials strike again.

Make PostgreSQL Access Easier and More Secure with Teleport

Managing PostgreSQL access is a pain for engineering teams. Setting up users, roles, and keeping track of permissions slows down engineers. Security risks may emerge in the form of shared admin accounts or missteps in user setup or authorization workflows. Check out this screenshot from a Reddit thread discussing this problem.

How Ditching RSA Made Teleport 77% More CPU-Efficient

In Teleport 17 we made the switch from RSA to ECDSA and Ed25519, and it paid off with improved security and significant performance benefits. This was a major undertaking; Teleport has used 2048-bit RSA keys for just about everything since our initial release. Switching to new key types and signature algorithms came with serious compatibility concerns given the broad range of environments Teleport is deployed in and the number of third party tools that use or trust Teleport-issued certificates.

Recap: Experience Frictionless Access Without Sacrificing Security

“We need to get stuff done – but I’m not supposed to let you.” Shipping high priority code, meeting tight release deadlines, fighting incident fires —there are countless reasons why today's engineering teams need to move at lightspeed. This need for speed may put them at odds with security objectives.

6 Ways Shadow Access Creates Risk in Your Infrastructure

One of the most dangerous threats to your infrastructure lurks unnoticed: shadow access. Shadow access can take many forms: privileged credentials left behind by former employees, shared keys embedded in code, or ad-hoc access granted outside of policy. These hidden risks can leave your organization vulnerable to breaches, compliance drift, and insider threats — all while remaining invisible to traditional security tools.

Trusted Computing: The Role of Infrastructure IAM

The role of trust for both employees and customers has come under increased scrutiny in the past decade. The rise of concepts such as zero trust for the workforce and the privacy/personalisation paradox for customers has moved trust from being an exercise in academic rigour, to one which has realigned enterprise security architecture choices.

It's Finally Time to Embrace Trusted Computing

Does your corporate network treat users on VPNs as trusted regardless of who they are? Does your web server connect to its database as a fictitious user with a password in a config file somewhere? Or perhaps the most frightening scenario: did your platform engineer log in as root to configure your CI/CD pipeline toolchain? These three situations are all examples of anonymous users – someone taking action somewhere on your network or in one of your cloud accounts without identifying themselves.

Teleport's Evolution: Today's Name Changes Reflect a Strategic Shift in Infrastructure Security

As the world of infrastructure security grows more complex, maintaining clarity and precision in how we present our solutions is critical. Teleport’s platform's capabilities have expanded significantly over time. To better align with our mission and help customers understand the full potential of our platform, we are introducing new names for our product suite.