Filter & Sort
  1. Where Large Language Models (LLMs) meet Infrastructure Identity

    As Large Language Models (LLMs) begin interfacing directly with real infrastructure, securing their access becomes critical. This article explores how the Model Context Protocol (MCP) enables LLMs to interact with databases and systems—and how Teleport’s Infrastructure Identity Platform ensures secure, auditable access. Learn how teams can enforce least-privilege policies, prevent over-permissioning, and maintain full audit trails even with AI in the loop.

  2. A Guide to Cyber Attack Maps for Network Protection

    Visualize the battlefield! Discover how real-time cyber attack maps offer crucial insights into global threats and targeted attacks, empowering your IT and security teams with enhanced situational awareness and streamlined communication to protect company networks.

  3. How Teleport Simplifies Just-in-Time Access

    Just-in-time (JIT) access is essential in cloud-native environments—but many implementations fall short. Teleport transforms JIT access into a native, secure-by-default capability by embedding it directly into identity, policy, and workflow infrastructure. From automated approvals to ephemeral credentials and unified audit logging, this article explores how Teleport enables least privilege access without the manual overhead or security gaps common in traditional JIT models.

  4. LoRaWAN Explained: Protocol, Perks, and Use Cases

    Unpack LoRaWAN: the low-power, long-range protocol powering the IoT revolution! Discover its unique features, star-of-stars architecture, and diverse applications from smart cities to industrial automation. Learn how it delivers cost-effectiveness, scalability, and enhanced connectivity, and how Netmaker boosts its network security.

  5. Private Tunnels: Benefits and Setup for Businesses

    Unmask the power of private tunnels! Discover how these secure passageways encrypt data, mask IPs, and leverage intrusion prevention for ultimate online privacy. Learn their benefits, setup essentials, and how solutions like Netmaker elevate network security for businesses.

  6. Spotting Spear Phishing: A Business Cybersecurity Guide

    Don't get speared! Discover how targeted phishing attacks can devastate businesses and learn to spot subtle deceptions used by cybercriminals. This guide reveals how attackers gather info, craft convincing messages, and offers essential prevention tips, including how Netmaker boosts network protection.

  7. Why Security Policies Frustrate Developers (and How We Can Fix Them)

    Most security policies create more problems than they solve, overwhelming developers with noise and unnecessary build breaks. Here's what a better approach looks like.

  8. Introducing AI Security Code Review

    Traditional AppSec misses critical design flaws? Discover Endor Labs' AI Security Code Review, a revolutionary agentic AI platform that analyzes pull requests for hidden architectural changes, new API endpoints, and authentication logic modifications, ensuring you catch high-impact security risks that rule-based tools miss.

  9. Meet the application security platform built for the AI era

    The era of vibe coding is here. Learn how Endor Labs is helping AppSec teams secure and fix AI-generated code with a new agentic AI platform.

  10. Celebrating a Decade of GitKraken

    Join GitKraken's VP of Marketing, Sara Stamas, on a nostalgic journey celebrating 10 years of innovation! From a 30-day project to a global DevEx powerhouse, discover how GitKraken revolutionized Git, embraced community, and evolved with acquisitions, AI, and a new DevEx Platform, all while staying true to its playful, tenacious spirit.

  11. Why Bad Workflows Are Silently Killing Your Velocity (and How to Fix It)

    Is invisible workflow inconsistency killing your team's velocity? Discover how undefined PR standards, chaotic branching, constant context switching, and poor onboarding silently derail productivity. Learn practical fixes and how to leverage AI to enhance—not replace—structured workflows, unlocking true speed and developer flow.

  12. The Cost of Doing Nothing: How Workflow Chaos Wastes 20+ Dev Hours a Month

    Is workflow chaos secretly costing your dev team 20+ hours a month? Discover how inconsistent PRs, endless merge conflicts, and slow onboarding silently kill velocity, and learn practical fixes to standardize your workflows for peak productivity and happier developers.

Items 1 to 12 of 183 total

Show per page