Find out how to implement access controls for your DevOps workflows like CICD, GitOps and more using Teleport.
As our company has been growing quickly, we’ve faced the build-vs-buy question numerous times. In this blog post we’re sharing our rationale for making these decisions.
Access proxy is an important tool for securing access to infrastructure. But reducing latency when accessing distributed computing resources is a challenge. Today we are announcing the multi-region support for Teleport cloud and explaining how we've built it.
What is sales engineering? How to become a sales engineer? Allen works as a sales engineer at Teleport and in this blog post he shares his journey.
In this blog post we’ll explain how an attacker can get access into a cloud environment by sending a malicious pull request.
Secure remote access to cloud infrastructure is painful. Access Plane technology allows consolidating access in one place.
Users interact with SaaS differently than on-prem. When we built Teleport Cloud, we deliberately designed it to reflect this change.
A fuzzer is a program that passes randomized data to an entrypoint of a target application. The goal is to stress test the target application.
eBPF lets programmers execute custom bytecode within the kernel without having to change the kernel or load kernel modules.
SCP is a simple tool with a quirky implementation. It does an okay job at moving files around, but newer software like SFTP and Rsync outperforms it.
An inside look at how we designed a discovery protocol for Teleport.
This post discusses the different approaches that can be taken to gracefully restart an application and provides a working sample that can be used to dig into the details. This post should be interesting to developers and SREs who build and maintain services written in Go.
We are playing with Elastic Beats, doing structured logging with Golang and Elastic Search
We discuss effective ways to handle errors in Go programming language.