Cmd blog posts

The Cmd Blog

A blog about security and protections
in Linux, DevOps, and the Cloud


Four Tips for Managing Named or Shared Accounts More Securely

By: Jennifer Ellard

Small startups to major Fortune 500 companies share one big cybersecurity challenge—managing accounts. This is especially tricky when it comes to shared accounts, where many users use the same credentials. Here are four tips to keeping this necessary evil in check.

Continue Reading 

How Successful Cmd Customers are Bringing an Engineering Mindset to Security

By: Jennifer Ellard

For many years, organizations have often approached security as a post-deployment consideration—something to address after a piece of software shipped, or something to address when a breach or other problem occured. Security engineers have made heroic efforts to create safe and secure products in a constantly-shifting, rapidly-evolving business environment.  In recent years, cybersecurity threats have…

Continue Reading 

Dial-Up Internet, Floppy Disks, and Booting from CDs: Join Us for a Trip Down Linux Memory Lane

By: Jennifer Ellard

#LinuxLovers: Cmd is about to launch a new free product called Cmd Free! Get deep visibility into who’s logging into your Linux servers and what they are doing. Join the waitlist now! It’s hard to believe, but Linux has been around for nearly 30 years. That’s a long time, and a lot has changed. Our…

Continue Reading 

Latest Tweets

You May Also Like


Activate Today

Gain best-in-class Linux observability in minutes... for free_

Cmd provides the fastest, easiest way to know what’s happening in your Linux environment, who’s logging in, what they are doing, processes they initiate and sensitive assets they access.

Activate Your Free Account arrow_forward

Copy link