How does HashiCorp Boundary pair with Cmd's eBPF monitoring solution for Linux?
A blog about security and protections
in Linux, DevOps, and the Cloud
By: Emily Nardone
This week, CNBC included us in their list of “100 of the world’s most promising start-ups to watch in 2019”, and interviewed our CEO, Jake King, to discuss how Vancouver is becoming a start-up mecca and beginning to give Silicon Valley a run for its money. Cmd Ranked for Data Breach Prevention Every year, CNBC…
By: Alex Bell
News broke earlier this month of a critical bug in the Linux command ‘sudo’, a core tool in Linux that allows user to run programs with elevated privileges. In typical Internet fashion, the announcement of this bug (labelled CVE-2019–14287) was followed by lots of scary headlines about opening Linux up to unauthorized users and enabling…
By: Emily Nardone
Recently, Cmd CEO & Co-Founder Jake King met with one of our favorite podcasters and award-winning journalist, Patrick Gray, from Risky.Biz. Risky.Biz is an Australian-based podcast that was founded in 2007, and is a must-listen for information security professionals looking to stay up-to-date with the market. In the interview, Jake talks with Patrick about security…
Linux’s flexibility means common developer behaviors can introduce serious security issues. We identify four scenarios and what you can do to avoid them.
This episode of the Risky Business podcast has Adam Cardillo and Curtis Simpson of HPE ITOC discuss the dual role Cmd plays in their Linux environments.
Cmd collects data about what happens on your Production Linux servers, but do you know how that data is structured, or what it contains? Read to find out.
The National Security Agency and Federal Bureau of Investigation detail a previously undisclosed Linux malware strain named “Drovorub.”
In this post, we explore some of the core ways that integrating ChatOps as part of permissions processes can improve security—and more.
TL;DR: Compliance can be a huge point of stress for cloud-first companies. In this co-written article with Audit Liaison, we’re sharing a handful of core actions to get your cloud audit-ready. Back in the “good” old days, audits involved much less data and way more paper. Today, a compliance audit can encompass massive amounts of…
Cmd provides the fastest, easiest way to know what’s happening in your Linux environment, who’s logging in, and what they are doing.Activate Your Free Account arrow_forward