RSS for Slack
unified cloud inventory
Product

Unified Cloud VM Inventory: Eliminate Security Blind Spots

Cloud environments don’t care about your org chart, and neither do attackers. Whether your workloads run on AWS, Azure, or GCP, your security team needs to investigate threats, query inventory, and understand risk without mentally translating between three different provider schemas. That translation work is slow, error-prone, and reduces time to remediation. Today, we’re excited […]

Azure
Product

Investigate Azure Threats Faster With Full Log Visibility

If you’re running workloads in Azure, chances are your security team has a solid handle on what’s configured. Resource settings, network rules, identity policies it’s all there in your posture management dashboard. But here’s the question that keeps security leaders up at night: do you know what’s actually happening? Configuration snapshots are great at telling […]

Blue hexagons on a white background with a prominent blue hexagon in the center featuring a white arrow. The word upwind is in the top left corner.
Product

Google Cloud Run Gets Direct Tracer Reporting for Scalable Runtime Security

Last year, we launched full security support for Google Cloud Run bringing posture management, real-time threat detection, vulnerability management, inventory discovery, and topology mapping to serverless container workloads. Teams using Cloud Run got the same Upwind coverage they already relied on for VMs and containers. Now we’re making that experience even simpler. With direct tracer […]

A New Way to Measure Cloud Security Posture
Product

Drive Remediation, Show Progress: A New Way to Measure Cloud Security Posture

You’ve invested in security tools and surfaced thousands of findings. Yet, when the board asks if the organization’s cloud risk is improving, the answer is a number without a story. When you need engineering to prioritize fixing issues, your request competes with every other item in an already-strained backlog. Finding issues isn’t the problem. The […]

AWS-Lambda-Runtime
Product

Beyond the Perimeter: Runtime Visibility for AWS Lambda

The industry has a snapshot problem. Static analysis and SCA tools tell you what might happen based on a manifest, but once a function is triggered, the execution environment becomes a black box. For most security teams, Lambda security is a “hope for the best” strategy. The “Old Way” relies on coarse-grained IAM policies and […]

Agentic Security is Here
Thought Leadership

Agentic Security Is Here — But Who Is Accountable When the AI Acts Alone?

TL;DR: Agentic security is the use of autonomous AI systems that detect, triage, and respond to threats without human intervention, which introduces a new category of operational risk. The most valuable security skill in 2026 is not prompt engineering or AI fluency. It’s consequence engineering: the ability to anticipate what happens when an autonomous system […]

From Notes to Snakes: NPM Supply Chain Attack
Research

From Nodes to Snakes: npm Supply Chain Attack Delivers Python Payload via axios

Executive Summary Our researchers and MDR team identified an npm supply chain attack involving malicious axios packages that leads to the execution of a Python-based payload on infected machines. The malware fingerprints the host, collects basic system and user environment data, and then communicates with attacker-controlled infrastructure to receive follow-on instructions. Rather than acting noisily, […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.