Cloud Security Podcast by Google

EP239 Linux Security: The Detection and Response Disconnect and Where Is My Agentless EDR

Aug 18, 2025
Craig H. Rowland, Founder and CEO of Sandfly Security, discusses crucial Linux security insights relevant to diverse environments including cloud and hybrid setups. He addresses significant blind spots for security teams and the misconception that Linux is immune to malware threats. The conversation covers the dangers of SSH key management, operational hurdles in incident response, and the subtle abuse of legitimate Linux utilities in attacks. Rowland also explores the benefits and trade-offs of agentless vs. agent-based monitoring, enhancing security through AI and innovative strategies.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Linux Is Extremely Heterogeneous

  • Linux is an umbrella term spanning tiny devices to massive cloud GPUs, so a single security approach rarely fits all systems.
  • Agentless methods gain compatibility across diverse CPUs and old kernels at the cost of some real-time visibility.
ANECDOTE

Ransomware Used An IP Camera

  • Craig recounts a ransomware case where an IP camera running Linux mounted Windows shares and encrypted data.
  • That example highlights how tiny, overlooked Linux devices can become primary attack vectors.
ADVICE

Deploy Agentless Forensic Binaries Over SSH

  • Use agentless access (e.g., SSH) where agents break compatibility or risk stability on mission-critical devices.
  • Deploy a small forensic binary over SSH to collect evidence without altering target system behavior.
Get the Snipd Podcast app to discover more snips from this episode
Get the app