Asymmetric relationships contribute to Cybersecurity failures

By: Thaddeus Walsh

This blog series is written for security professionals whose security posture is moderate to high. Even those companies who have the basics in security covered can run into security challenges between digital transformation, cloud, or Linux environments. In this blog series, we’ll address a few we see from our customers and prospects. The first installment…

Continue Reading 

Cloud Security from Cmd is live on the Amazon Web Services Marketplace

By: Jennifer Ellard

It’s important to have your cloud-based security platform available to cloud architects and professionals. Cmd recently made part of it’s solution available to Amazon Web Services (AWS) customers. From the AWS marketplace, cloud gurus can select a trial of Cmd or one of our for-purchase Cmd products.    Cloud Security, especially detection, is difficult for…

Continue Reading 

Cmd Advisory: (Baron Samedit) Sudo Exploit CVE-2021-3156

By: Shashank Kittane Suryanarayana and Jake King

Sudo bug delivers an easy to exploit privilege escalation vulnerability for any system user. In July of 2011, a privilege escalation vulnerability was added to the Linux sudo program (Versions Ubuntu 20.04 (Sudo 1.8.31), Debian 10 (Sudo 1.8.27), and Fedora 33 (Sudo 1.9.2) and lay dormant until researchers at Qualys identified it and published their…

Continue Reading 

Latest Tweets

You May Also Like


Activate Today

Gain best-in-class Linux observability in minutes... for free_

Cmd provides the fastest, easiest way to know what’s happening in your Linux environment, who’s logging in, what they are doing, processes they initiate and sensitive assets they access.

Activate Your Free Account arrow_forward