Resources

Resources_

Tips, tutorials, and best practices for protecting Linux clouds, and data centers.

press-kit

Best Practices on Understanding Who is in Your Cloud

Learn how to use free and open-source tools to discover who’s in your cloud so you can meet your compliance requirements and improve your security posture quickly.

Webinar

Cmd Customers Talk About Their Experiences on Risky Business #591

In this episode of the Risky Business podcast, hosts Patrick and Adam have a chance to talk to two folks who have implemented Cmd to solve their Ops and Security challenges within their Production Linux environments.

Podcast

PDX OWASP Podcast: A Sudden Shift in Threat Modeling

Listen in as CEO, Jake King, joins the PDX OWASP Podcast to discuss how to build and maintain diversity in the security industry & much more.

Podcast

Address PCI Requirement #10 with Cmd

This document explains how Cmd maps to PCI Requirement 10: tracking and monitoring access to network resources and cardholder data.

Solution Sheet

Making a Science of Compliance: Logging and Monitoring Production Linux Environments

Join us in this Cmd Academy session to learn how Cmd can support compliance efforts for Production Linux.

Webinar

Cmd vs. EDR on Linux

See how Cmd’s detection and response capabilities, designed exclusively for Production Linux, differ from established solutions.

Solution Sheet

Who’s In Your Cloud? How Privileged Access Controls are Leaving You Exposed

Join Cmd’s Head of Security, John Brunn, to learn why it’s so difficult to understand and locate who is in your cloud, and how to fix it.

Webinar

How To: Harden Your Production Linux OS for Maximum Security

Cmd delivers a simple, easy way to harden the Linux operating system in production environments where sensitive data and critical applications are run.

Webinar

See The Security Platform that DevOps Prefers

Join us for a demo of Cmd’s security platform, where we show you how to create guardrails and controls for privileged and shared accounts to restrict dangerous and sensitive actions, even for root users.

Webinar

Cmd for Production Linux vs. Legacy PAM

Download this solution sheet to see how Cmd can protect your production Linux environment – better than legacy PAM would.

Solution Sheet

Next Generation Linux Server Security

This whitepaper looks at the deficiencies of Linux from the security perspective and how to lock down your Linux environment effectively.

Whitepaper

Defense in Depth: Shared Accounts & Other Bad Habits

Accounts. We’ve all got them—probably more of them than we even know. As companies grow, move to the cloud, and change from one platform to another, accounts have a way to proliferate. That’s true for named accounts, and it’s true for the cockroach of software: shared accounts. No matter what you do, they always seem…

Podcast

Best Practices For Understanding Who Is In Your Cloud

CEO, Jake King, will be discussing best practices for understanding who is in your cloud (the good guys and the bad) and what to do about it. You’ll also learn how to use free and open-source tools so you can meet your compliance requirements and improve your security posture quickly.

Webinar

Hacker Days: Visualizing the Void of Security Audit Data

Join CEO, Jake King, as he discusses the detection of three well-defined security problems – adversarial user behavior, lateral movement, and insider threat detection – using a relatively untapped data set: shell and session commands.

Webinar

CmdAcademy: How to Audit Who is in Your Cloud – The Good and the Bad

Learn how to use Cmd to manage who has access to your cloud environment and see who’s actually logging in.

Webinar

How to Use Access Guardrails to Protect Your Cloud & Empower DevOps

Watch this webcast to replace heavy-handed access controls with lightweight, agile access guardrails.

Webinar

Redefining Privileged Access Management for Agile Cloud Environments

Learn how privileged access inside cloud environments is different, and what you need to do to adapt.

Webinar

SANS Institute: Taming Linux for Enterprise Security

This webcast examines Linux from a security perspective and how to lock it down more effectively.

Webinar

7 Techniques for Ramping Your DevSecOps Program Quickly

These battle-tested tricks will help your DevOps team ramp security fast and still deliver code on time.

Webinar

Four Reasons Why Linux Attacks Will Grow in 2020

Learn about the reasons Linux is becoming an increasingly more attractive target in 2020.

Whitepaper

Linux Security Self-Assessment

Download this checklist to assess how your Linux environment compares to the best protected ones out there.

Solution Sheet

Cmd vs. OSquery

This comparison shows how Cmd provides real-time visibility and control that far surpasses osquery on Linux.

Solution Sheet

Cmd vs. Auditd

This comparison shows how Cmd is faster, easier, and more flexible than Auditd for logging and auditing on Linux.

Solution Sheet

Addressing SOC2 Compliance with Cmd

This document details how Cmd maps to the latest specific SOC 2 Trust Services Criteria (2017 TSC).

Solution Sheet

Cmd for Securing High-Velocity DevOps on Linux Clouds

Learn how Cmd protects production Linux environments without slowing DevOps down.

Solution Sheet

Cmd for High-Fidelity Threat Detection & Incident Response on Linux

Learn how Cmd provides high-fidelity telemetry and incident response for Production Linux environments.

Solution Sheet

Cmd for Cloud Compliance & Auditing

Learn how Cmd provides command-line visibility and policy enforcement for cloud compliance and auditing.

Solution Sheet

CISO Roundtable on the Transition to Remote Work

Kevin Paige, CISO of Flexport, discusses how being a CISO during COVID-19 and the transition to remote work.

Video

Cmd Sponsors Darknet Diaries 52: Magecart

Listen to Jack Rhysider dive deep into the growing popularity of credit card skimming off of websites.

Podcast

Cmd Sponsors Darknet Diaries 54: NotPetya

Listen to Jack Rhysider tell the story of NotPetya, the first time we’ve seen what a cyber war looks like.

Podcast

Jake King discusses MITRE ATT&CK on Risky Biz #560

Hear Jake discuss our work applying the MITRE ATT&CK framework to Linux and container environments.

Podcast

Risky Biz Soap Box: Cmd’s Jake King talks Linux security

Patrick Gray and CEO Jake King talk about Linux event data, AI and alerts, and the upcoming release of Cmd Free.

Podcast

Cmd Product Overview

Two-minute explainer video showing off Cmd’s solution for securing Production Linux.

Video

Cmd for Securing Root Users & Privileged Accounts

Learn how Cmd monitors and enforces policy for privileged users, root users, and shared accounts.

Solution Sheet

A SANS Whitepaper – Taming the Wild West: Finding Security on Linux

This whitepaper examines Linux from a security perspective and how to lock it down more effectively.

Whitepaper
Copy link
Powered by Social Snap