TL;DR: Forbes called Cmd one of the “20 Best Cybersecurity Startups to Watch in 2020.” Learn more about why cybersecurity is on the rise, and why Linux production environment security is so important.
Recently, we were honored to see Cmd included in Forbes list of the “20 Best Cybersecurity Startups to Watch in 2020.” We are in good company alongside 19 other startups tackling the full spectrum of cybersecurity threats, from network detection, to password protection, and beyond.
As remote work is normalized and cloud environments become the standard, organizations around the world need to take security more seriously than ever before. That’s why there are tens of thousands of security startups—21,729, to be precise—in existence today, according to Forbes.
We see Cmd’s inclusion in Forbes as part of a growing recognition that the growing use of Linux in production environments is one of the most vulnerable elements of any organization’s security posture.
The Importance of Securing Linux Production Environments
High-scale, high-performance environments are an essential component to all businesses these days, and Linux is the dominant choice to use for these. Part of what makes Linux so beloved to developers is its flexibility—your imagination is the limit in Linux, unlike other operating systems that are more restrictive and prescriptive. This flexibility is a double-edged sword however, as the ability to customize in Linux also introduces the potential for security gaps. And because Linux production environments give users so much creative control, once someone is in the system, they can often make changes and access proprietary or sensitive information without limit.
For all these reasons, it’s crucial that organizations secure Linux production environments—yet, the fast-changing nature of the cloud combined with a general lack of standardized security practices means they are often not fully secured. At Cmd, we believe that all organizations must employ a robust defense in depth strategy to secure Linux production environments.
Of course, login credentials, both individual and shared, are a major part of how organizations handle security. Credentials provide access management for environments—like production Linux—that are likely to contain proprietary and sensitive information. When these credentials fall into the wrong hands, the impact can be devastating. This is why securing environments through sophisticated and auditable access management is so key.
Per the 2020 Verizon Data Breach Investigations Report, while only eight percent of reported breaches were caused by authorized users misusing their power, 37 percent of breaches were caused by someone who “stole or used credentials.” In fact, when breaches occurred, the top two tactics for attackers were phishing and stealing credentials. Moreover, according to the 2020 report, a shocking 77 percent of cloud-specific breaches involved compromised credentials.