Cmd joins Elastic to Further Cloud Runtime Security 

By: Santosh Krishnan

Wow! What a difference a year makes. Almost a year ago, I joined Cmd. I was immediately impressed with the product, knowledgeable customers and, mostly, Cmd’s people and their culture. This team has accomplished so much in the past few years, I’m very proud to be a part of it. It’s time for Cmd as…

Continue Reading 


How Cybersecurity Laws Impact Multinational Cloud Workloads

By: Scott Holt

Many organizations operate out of more than one country. When you share cloud or application access across multiple nations, you are subject to each country’s cybersecurity regulations. What are the cybersecurity laws in China, Canada, or Brazil? With recent changes to national regulations like China’s Multi-level Protection Scheme (MLPS 2.0), organizations may find themselves facing…

Continue Reading 


Attack Lifecycle Philosophy: Thinking Backwards, Past Entrypoint Security

By: Thaddeus Walsh

In the last blog, we discussed a handful of asymmetries that, together, explain the seemingly endless depth of cost and effort required to properly secure technology assets. In this piece, we’ll cover the life cycle of a cyberattack. This life cycle is universally consistent across cyberattacks, so we’ll be leaning on that consistency to upend…

Continue Reading 


Latest Tweets


You May Also Like

 
 

Activate Today

Gain best-in-class Linux observability in minutes... for free_

Cmd provides the fastest, easiest way to know what’s happening in your Linux environment, who’s logging in, what they are doing, processes they initiate and sensitive assets they access.

Activate Your Free Account arrow_forward