Cmd blog posts

The Cmd Blog

A blog about security and protections
in Linux, DevOps, and the Cloud


The Curious Incident of the -EINVAL in the libbpf

By: Rhys Rustad-Elliott

“Is there any point to which you would wish to draw my attention?” “To the curious incident of the libbpf in the night-time.” “The libbpf returned -EINVAL in the night-time.” “That was the curious incident,” remarked Sherlock Holmes. At Cmd, the type of work we do often involves diagnosing a number of rather strange bugs…

Continue Reading 

Asymmetric relationships contribute to Cybersecurity failures

By: Thaddeus Walsh

This blog series is written for security professionals whose security posture is moderate to high. Even those companies who have the basics in security covered can run into security challenges between digital transformation, cloud, or Linux environments. In this blog series, we’ll address a few we see from our customers and prospects. The first installment…

Continue Reading 

Cloud Security from Cmd is live on the Amazon Web Services Marketplace

By: Jennifer Ellard

It’s important to have your cloud-based security platform available to cloud architects and professionals. Cmd recently made part of it’s solution available to Amazon Web Services (AWS) customers. From the AWS marketplace, cloud gurus can select a trial of Cmd or one of our for-purchase Cmd products.    Cloud Security, especially detection, is difficult for…

Continue Reading 

Latest Tweets

You May Also Like


Activate Today

Gain best-in-class Linux observability in minutes... for free_

Cmd provides the fastest, easiest way to know what’s happening in your Linux environment, who’s logging in, what they are doing, processes they initiate and sensitive assets they access.

Activate Your Free Account arrow_forward

Copy link
Powered by Social Snap