Join Us At DeveloperWeek Global: Cloud 2020 | September 29-30
By: Sean Blanton
Linux’s flexibility means common developer behaviors can introduce serious security issues. We identify four scenarios and what you can do to avoid them.
By: Sean Blanton
This episode of the Risky Business podcast has Adam Cardillo and Curtis Simpson of HPE ITOC discuss the dual role Cmd plays in their Linux environments.
The National Security Agency and Federal Bureau of Investigation detail a previously undisclosed Linux malware strain named “Drovorub.”
In this post, we explore some of the core ways that integrating ChatOps as part of permissions processes can improve security—and more.
TL;DR: Compliance can be a huge point of stress for cloud-first companies. In this co-written article with Audit Liaison, we’re sharing a handful of core actions to get your cloud audit-ready. Back in the “good” old days, audits involved much less data and way more paper. Today, a compliance audit can encompass massive amounts of…
Ensuring security in Production Linux environments is a major challenge, so take it in phases. In the second of this 2-part series, we discuss the walk and run stages for a more secure and well-regulated Production Linux environment.
TL;DR: Production Linux environments are often difficult to secure. In this two-part blog series, we discuss practical steps to crawl, walk, and then run toward more secure and well-regulated production environments. Ensuring security for Production Linux environments can be a daunting task. Because Linux began as an open source, collaborative project, it has evolved in…
TL;DR: It can be a challenge to understand where a cloud vendor’s security ends and where an internal team’s responsibilities begin. Cmd will be doing a deep dive into hardening Linux production environments in the coming months. In this initial post, we walk through six steps any organization can take to get started. Whether organizations…
Cmd provides the fastest, easiest way to know what’s happening in your Linux environment, who’s logging in, and what they are doing.Activate Your Free Account arrow_forward