Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Ways to Keep AWS Fast with Just-in-Time Access

Modern AWS environments move fast. Engineers spin up EKS clusters for testing, automation pipelines deploy to production, and AI agents trigger infrastructure workflows via Amazon Bedrock. AWS provides ways to manage access primitives such as roles and privileges to keep up with this velocity, such as STS AssumeRole, OIDC federation, IAM Authenticator, and Identity Center. But the challenge isn’t in these primitives themselves. It's the human factor behind the primitives.

ISO 27001:2022 Requirements Explained for 2025

ISO/IEC 27001:2022 provides a framework for managing information security using an Information Security Management System (ISMS). The October 2025 deadline to upgrade from the previous ISO 27001:2013 standard is coming fast, and organizations yet to transition risk losing their certification. Maintaining ISO/IEC 27001 certification is especially relevant for regulated industries, SaaS providers with enterprise customers, and global organizations handling sensitive data.

3 VNet Use Cases to Simplify Internal Access (Without VPNs)

VPNs have their time and place. But at Teleport, we don’t think accessing internal engineering resources is one of them. VPNs create friction, slow down development workflows, and often become security bottlenecks. That's where VNet comes in. Teleport VNet was designed to give engineers a secure way to access internal applications without VPNs or port forwarding.

Workload Identity Meets Supply Chain Security: Teleport's Sigstore Integration

It’s no secret that the software development life cycle is becoming more complex. With a plethora of libraries, frameworks, and now AI coding agents and assistants, we can build far more ambitious software in a fraction of the time. This is fantastic! But with it come greater opportunities for accidental or malicious security bugs and vulnerabilities to sneak in undetected, with potentially devastating consequences for your users and their trust in your company.

Your Infrastructure Has a Non-Human Trust Problem

Modern infrastructure is increasingly run by automated systems, not people. Bots push code. Runners deploy to prod. Agents orchestrate cloud resources. And increasingly, AI models trigger actions directly through prompt-driven automation. Welcome to the era of non-human identities (NHIs): the invisible workforce operating behind modern digital systems.

Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD

Back in 2024, Amazon Web Services (AWS) engaged Trail of Bits (ToB) to perform a comparative assessment between several authorization and access management policy languages. If you're unfamiliar with the concept of a policy engine, it's essentially a fully-featured engine that offloads authorization decisions in an application.