Cmd blog posts

The Cmd Blog

A blog about security and protections
in Linux, DevOps, and the Cloud


Tackling Production Linux Security in Three Phases: Part One

By: Jennifer Ellard

TL;DR: Production Linux environments are often difficult to secure. In this two-part blog series, we discuss practical steps to crawl, walk, and then run toward more secure and well-regulated production environments. Ensuring security for Production Linux environments can be a daunting task. Because Linux began as an open source, collaborative project, it has evolved in…

Continue Reading 

Six Steps to Harden Linux Production Environments

By: Jake King

TL;DR: It can be a challenge to understand where a cloud vendor’s security ends and where an internal team’s responsibilities begin. Cmd will be doing a deep dive into hardening Linux production environments in the coming months. In this initial post, we walk through six steps any organization can take to get started. Whether organizations…

Continue Reading 

Cmd is a Forbes Top 20 Cybersecurity Startup to Watch in 2020

By: Jennifer Ellard

TL;DR: Forbes called Cmd one of the “20 Best Cybersecurity Startups to Watch in 2020.” Learn more about why cybersecurity is on the rise, and why Linux production environment security is so important. Recently, we were honored to see Cmd included in Forbes list of the “20 Best Cybersecurity Startups to Watch in 2020.” We…

Continue Reading 

Latest Tweets

You May Also Like


Activate Today

Gain best-in-class Linux observability in minutes... for free_

Cmd provides the fastest, easiest way to know what’s happening in your Linux environment, who’s logging in, what they are doing, processes they initiate and sensitive assets they access.

Activate Your Free Account arrow_forward

Copy link