Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top Use Cases & Trends in Machine & Workload Identity

Speakers: As infrastructure becomes increasingly automated, the systems that deploy, manage, and scale it—CI/CD pipelines, service agents, orchestration tools—rely on a growing class of non-human identities (NHIs). These machine actors often operate with persistent credentials, excessive privileges, and limited visibility—leaving critical trust gaps in modern environments. This session explores three high-impact use cases where addressing NHI is both urgent and achievable.

Workload Identity Meets Supply Chain Security: Teleport's Sigstore Integration

It’s no secret that the software development life cycle is becoming more complex. With a plethora of libraries, frameworks, and now AI coding agents and assistants, we can build far more ambitious software in a fraction of the time. This is fantastic! But with it come greater opportunities for accidental or malicious security bugs and vulnerabilities to sneak in undetected, with potentially devastating consequences for your users and their trust in your company.

Your Infrastructure Has a Non-Human Trust Problem

Modern infrastructure is increasingly run by automated systems, not people. Bots push code. Runners deploy to prod. Agents orchestrate cloud resources. And increasingly, AI models trigger actions directly through prompt-driven automation. Welcome to the era of non-human identities (NHIs): the invisible workforce operating behind modern digital systems.

Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD

Back in 2024, Amazon Web Services (AWS) engaged Trail of Bits (ToB) to perform a comparative assessment between several authorization and access management policy languages. If you're unfamiliar with the concept of a policy engine, it's essentially a fully-featured engine that offloads authorization decisions in an application.

How to Secure MCP Servers | A Walkthrough

While the hype continues to build around MCP, or model context protocol, a growing number of engineers and organizations are becoming concerned about the potential security risks that MCP invites. In this video, I'll give a demo of how Teleport provides secure access to your MCP servers and how the new Teleport Secure MCP integration gives you a robust solution for protecting your LLM endpoints and data sources.

Securing AI and Infrastructure with Teleport + Anthropic's Model Context Protocol (MCP)

Securing AI and Infrastructure with Teleport + Anthropic’s Model Context Protocol (MCP) Speakers: As Large Language Models (LLMs) become everyday tools for developers and knowledge workers, ensuring secure, controlled, and auditable access to infrastructure and data is more critical than ever. Join us to learn how Teleport is integrating with Anthropic’s Model Context Protocol (MCP) to deliver robust zero-trust security for AI workflows.

Why We Don't Call Them SDRs Anymore: Inside Teleport's Take on Modern Sales Development

Insights from Chris Dugan, Manager, Enterprise Account Development at Teleport If you're just starting out in sales, chances are you've come across the title “SDR” (Sales Development Representative) more times than you can count. But here at Teleport, we’ve rebranded our entire SDR function to something that better reflects the real work being done: Enterprise Account Development.

Teleport to Protect AI and Grant AI Access

How teams are securing AI systems and providing protected access to sensitive resources. Learn about self-hosted AI solutions, database integrations with full audit capabilities, and centralized MCP server deployment. Discover how Teleport enables secure AI integration with your infrastructure while maintaining comprehensive visibility and control. Perfect for teams looking to balance innovation with security compliance.