Cmd.com will be migrated to Elastic.co shortly.
Tips, tutorials, and best practices for protecting Linux clouds, and data centers.
Digital Transformation initiatives are brewing at nearly every large enterprise. But, how are they currently doing? Are companies halfway finished or more? What consistent challenges are they running into? When will these efforts be completed? Recently, ViB, Incisiv and Cmd teamed to uncover the state of digital transformation initiatives. They surveyed over 300 IT professionals…
Do you need to demonstrate ISO controls more easily than you currently are? Check out this white paper to see how Cmd can help you be compliant with ISO/IEC 27001.
You might be curious how Cmd can help you increase your security posture across the Google Cloud Platform (GCP). If so, this quick read solution sheet has all the benefits about protecting your GCP environment with Cmd. Runtime Visibility Across Google Cloud
Join Risky Business’ host, Patrick Gray, and Jake King, co-founder and CSO of Cmd, as they discuss current challenges in cybersecurity, including challenges and fixes for digital transformation. Jake says there’s a big cloud modernization push happening right now as people re-architect their “legacy cloud” and Linux infrastructure into more modern setups.
If you operate production servers in the cloud, how are you ensuring everything is protected? This infographic outlines what attack vectors are most prevalent to cloud workloads and offers advice on how to protect your most important infrastructure components. Harden Your Cloud Environments Infographic
Uncover the findings of 266 IT respondents of the 2021 State of Digital Transformation Survey quickly in this 10-slide Executive Summary. The survey covers the timing, challenges and impact of Covid-19 on enterprises in this survey. The biggest challenge may surprise you.
Digital Transformation is a key initiative at many enterprise organizations currently. Recently, independent research was conducted by ViB, which surveyed 266 IT, cloud and security professionals to determine the timing, challenges and goals surrounding digital transformation. The survey’s findings are outlined in this paper.
Cloud marketplaces, including AWS and Google Cloud, offer a way to purchase Cmd on your existing cloud enterprise agreements. Discover how you secure your cloud infrastructure within a few clicks. 3 Ways to Purchase Cmd to Secure Your Cloud
This recent market research conducted by Incisiv shows how enterprise Chief Digital Officers and Chief Information Security Officers can work together to ensure their cloud implementations are secured and their organizations meet their transformation goals.
You likely consider securing your cloud infrastructure similarly to the way you secure your desktops and laptops. Cloud workloads aren’t the same and need to be secured differently. Read this case study which shows three reasons to think about them differently and how this could impact your return on investment positively. 3 Reasons to Secure…
Cmd Academy shares security best practices with the overall security community. This whitepaper about how to help secure RubyonRails is no different. It offers step-by-step guidance on how to configure Cmd to further strengthen your Ruby instance. Dig in!
SaaS Provider’s Digital Transformation Case Study
Read how this Leading US Airline leveraged Cmd to monitor and protect their Linux infrastructure.
This document explains how Cmd provides Infrastructure Detection and Incident Response for Linux workloads
GoodData is keen to think outside the box and move beyond conventional wisdom, which has proven to be a highly effective growth strategy.
Read this guide to learn how Cmd can assist in adhering to a number of the criteria outlined for Linux Infrastructure in the ACSC Essential Eight framework.
Together with Cmd, Gremlin’s DevOps and SecOps teams are able to manage Production Linux environments with greater visibility, speed, and efficiency.
Learn how to use free and open-source tools to discover who’s in your cloud so you can meet your compliance requirements and improve your security posture quickly.
In this episode of the Risky Business podcast, hosts Patrick and Adam have a chance to talk to two folks who have implemented Cmd to solve their Ops and Security challenges within their Production Linux environments.
Listen in as CEO, Jake King, joins the PDX OWASP Podcast to discuss how to build and maintain diversity in the security industry & much more.
This document explains how Cmd maps to PCI Requirement 10: tracking and monitoring access to network resources and cardholder data.
Join us in this Cmd Academy session to learn how Cmd can support compliance efforts for Production Linux.
Join Cmd’s Head of Security, John Brunn, to learn why it’s so difficult to understand and locate who is in your cloud, and how to fix it.
Cmd delivers a simple, easy way to harden the Linux operating system in production environments where sensitive data and critical applications are run.
Join us for a demo of Cmd’s security platform, where we show you how to create guardrails and controls for privileged and shared accounts to restrict dangerous and sensitive actions, even for root users.
Download this solution sheet to see how Cmd can protect your production Linux environment – better than legacy PAM would.
This whitepaper looks at the deficiencies of Linux from the security perspective and how to lock down your Linux environment effectively.
Accounts. We’ve all got them—probably more of them than we even know. As companies grow, move to the cloud, and change from one platform to another, accounts have a way to proliferate. That’s true for named accounts, and it’s true for the cockroach of software: shared accounts. No matter what you do, they always seem…
CEO, Jake King, will be discussing best practices for understanding who is in your cloud (the good guys and the bad) and what to do about it. You’ll also learn how to use free and open-source tools so you can meet your compliance requirements and improve your security posture quickly.
Join CEO, Jake King, as he discusses the detection of three well-defined security problems – adversarial user behavior, lateral movement, and insider threat detection – using a relatively untapped data set: shell and session commands.
Learn how to use Cmd to manage who has access to your cloud environment and see who’s actually logging in.
Watch this webcast to replace heavy-handed access controls with lightweight, agile access guardrails.
Learn how privileged access inside cloud environments is different, and what you need to do to adapt.
This webcast examines Linux from a security perspective and how to lock it down more effectively.
These battle-tested tricks will help your DevOps team ramp security fast and still deliver code on time.
Learn about the reasons Linux is becoming an increasingly more attractive target in 2020.
Download this checklist to assess how your Linux environment compares to the best protected ones out there.
This comparison shows how Cmd provides real-time visibility and control that far surpasses osquery on Linux.
This comparison shows how Cmd is faster, easier, and more flexible than Auditd for logging and auditing on Linux.
This document details how Cmd maps to the latest specific SOC 2 Trust Services Criteria (2017 TSC).
Learn how Cmd protects production Linux environments without slowing DevOps down.
Learn how Cmd provides high-fidelity telemetry and incident response for Production Linux environments.
Learn how Cmd provides command-line visibility and policy enforcement for cloud compliance and auditing.
Kevin Paige, CISO of Flexport, discusses how being a CISO during COVID-19 and the transition to remote work.
Listen to Jack Rhysider dive deep into the growing popularity of credit card skimming off of websites.
Listen to Jack Rhysider tell the story of NotPetya, the first time we’ve seen what a cyber war looks like.
Hear Jake discuss our work applying the MITRE ATT&CK framework to Linux and container environments.
Patrick Gray and CEO Jake King talk about Linux event data, AI and alerts, and the upcoming release of Cmd Free.
Two-minute explainer video showing off Cmd’s solution for securing Production Linux.
Learn how Cmd monitors and enforces policy for privileged users, root users, and shared accounts.
This whitepaper examines Linux from a security perspective and how to lock it down more effectively.