Kubernetes Dashboard: Features, Security Concerns, and Best Practices
The Kubernetes Dashboard is a popular web-based interface designed to simplify the management of Kubernetes clusters. It provides an intuitive UI that allows users to view and manage cluster resources without needing to work directly with command-line tools. However, while convenient, the Kubernetes Dashboard also presents specific security risks that should be carefully managed, especially […]
How Upwind Leverages AWS CloudTrail for Enhanced Threat Detection Capabilities
As a part of Upwind’s runtime-powered threat detection capabilities, the Upwind Platform integrates seamlessly with AWS CloudTrail to provide real-time monitoring and detection of cloud logs. By leveraging AWS CloudTrail Logs generated at runtime, Upwind is able to provide deep runtime context and automatically alert you to suspicious or malicious log events. What is CloudTrail? […]
Upwind Makes Waves at AWS re:Invent 2024
It has been a big week for Upwind here at AWS re:Invent 2024! Our team has been on the ground in Las Vegas, Nevada this week for AWS’s largest annual conference. Here’s a quick look at what we’ve been up to. Monday, December 2. We announced our $100 million Series A, which was featured in […]
Introducing The Next Generation of Shift Left Security, Powered by Runtime
Today, we’re thrilled to introduce Upwind Shift Left – a major new capability in the Upwind platform that brings the power of runtime intelligence to CI/CD pipelines, transforming how teams secure their software at every step. By marrying real-world runtime context with build-time best practices, this next-generation solution redefines shift left for modern cloud security. […]
The Upwind Cloud Security Platform is now available in the EC2 Image Builder on AWS
December 4, 2024 — Upwind, the next-generation cloud security platform, announced today that the Upwind Cloud Security Platform is available as a software component in the EC2 Image Builder console of Amazon Web Services (AWS). EC2 Image Builder is a fully-managed service that simplifies the customization, testing, distribution, and lifecycle management of Amazon Machine Images […]
Upwind Secures $100M to Power Next-Generation Cloud Security
Customers have always been our north-star. Being “Driven By Customers” is not just a paragraph written on our Careers page – it’s the way we operate on a daily basis. It is how we hire, promote, and give each other feedback at Upwind. It is also how we build products, prioritize features, and think about […]
Critical Kubernetes gitRepo Volume Vulnerability: CVE-2024-10220
A critical security vulnerability identified as CVE-2024-10220 has been discovered in Kubernetes’ deprecated gitRepo volume type. This vulnerability allows attackers with permissions to create pods using gitRepo volumes to execute arbitrary commands on the host node with root privileges, potentially leading to full system compromise. The gitRepo volume type was designed to clone Git repositories […]
Optimize Infrastructure Costs & Performance with Upwind
In this webinar, we explore common challenges that DevOps teams face and look at how Upwind’s comprehensive platform can provide the solutions you need. From real-time network visibility and infrastructure insights to powerful cost optimization tools, Upwind empowers teams to protect their cloud environments and maximize their investments. Watch this webinar recap to understand how […]
Upwind Extends Cloud Scanning Capabilities with Windows OS Support
We are excited to announce that Upwind’s cloud scanning capabilities now include support for Windows OS, providing even deeper security coverage for cloud environments. This extended support is providing even deeper coverage for Upwind customers across their cloud stack. For Upwind customer Intezer, this extended OS coverage has helped to consolidate tools and increase visibility […]
Ransomware’s Reach: Data Risks, IP Theft, and Encryption Takeover in the Cloud
In our previous article on Cloud Heists, we highlighted how attackers exploit credential theft and privilege escalation to take over cloud environments. However, ransomware poses an even broader threat, targeting cloud platforms to steal sensitive data, disrupt business operations, and hold companies hostage. In this post, we’ll explore these growing ransomware trends and offer insights […]