Cmd.com will be migrated to Elastic.co shortly.
By: Thaddeus Walsh
This blog series is written for security professionals whose security posture is moderate to high. Even those companies who have the basics in security covered can run into security challenges between digital transformation, cloud, or Linux environments. In this blog series, we’ll address a few we see from our customers and prospects. The first installment…
By: Jennifer Ellard
It’s important to have your cloud-based security platform available to cloud architects and professionals. Cmd recently made part of it’s solution available to Amazon Web Services (AWS) customers. From the AWS marketplace, cloud gurus can select a trial of Cmd or one of our for-purchase Cmd products. Cloud Security, especially detection, is difficult for…
By: Shashank Kittane Suryanarayana and Jake King
Sudo bug delivers an easy to exploit privilege escalation vulnerability for any system user. In July of 2011, a privilege escalation vulnerability was added to the Linux sudo program (Versions Ubuntu 20.04 (Sudo 1.8.31), Debian 10 (Sudo 1.8.27), and Fedora 33 (Sudo 1.9.2) and lay dormant until researchers at Qualys identified it and published their…
Recently, ViB and Cmd conducted a survey called (State of Digital Transformation Survey – 2021) to understand more about Digital Transformation. We learned a lot and thought it might help you prioritize transformation and even security decisions for 2021 and beyond. The research found that 74% of respondents believe threat detection is the top challenge…
As security practitioners, we are often given problems that have obscure solution sets available. Problems such as “make sure we are not in the headlines!”, “we need cloud security,” or the laughable idea of being unhackable gets thrown around. One thing we’ve seen plenty of is security ops scratching their heads to create a usable…
Infrastructure Detection and Response (IDR) remains one of the more interesting topics I am asked to cover at Cmd, often in the context of modern cloud workloads and environments. Recently, I had the privilege of speaking at the ISACA North America conference, and covered a few of these topics in a little detail, you can…
At Cmd, we spend a lot of time in cloud environments, specifically Linux environments. When you are migrating applications to the cloud or transforming your digital footprint, it’s best to learn from those who have made mistakes and set yourself up for success with a solid plan. We’ve taken a deeper dive into some of…
At Cmd, we spend a lot of time in cloud environments, specifically Linux environments. When you are migrating applications to the cloud or transforming your digital footprint, it’s best to learn from those who have made mistakes and set yourself up for success with a solid plan. We’ve taken a deeper dive into some of…
“Is there any point to which you would wish to draw my attention?” “To the curious incident of the libbpf in the night-time.” “The libbpf returned -EINVAL in the night-time.” “That was the curious incident,” remarked Sherlock Holmes. At Cmd, the type of work we do often involves diagnosing a number of rather strange bugs…
Cmd provides the fastest, easiest way to know what’s happening in your Linux environment, who’s logging in, what they are doing, processes they initiate and sensitive assets they access.
Activate Your Free Account arrow_forward