Investigate Azure Threats Faster With Full Log Visibility
If you’re running workloads in Azure, chances are your security team has a solid handle on what’s configured. Resource settings, network rules, identity policies it’s all there in your posture management dashboard. But here’s the question that keeps security leaders up at night: do you know what’s actually happening? Configuration snapshots are great at telling […]
Google Cloud Run Gets Direct Tracer Reporting for Scalable Runtime Security
Last year, we launched full security support for Google Cloud Run bringing posture management, real-time threat detection, vulnerability management, inventory discovery, and topology mapping to serverless container workloads. Teams using Cloud Run got the same Upwind coverage they already relied on for VMs and containers. Now we’re making that experience even simpler. With direct tracer […]
RSAC 2026 from the floor: What an AE heard between the keynotes and the handshakes
RSAC 2026 drew 43,500 attendees, 600+ exhibitors, and enough AI announcements to fill a small data lake. But the conversations that mattered most didn’t happen on the main stage. They happened in hallway pull-asides, over bad coffee, at HH and during blunt one-on-ones with security leaders who are done being marketed to and ready to […]
Drive Remediation, Show Progress: A New Way to Measure Cloud Security Posture
You’ve invested in security tools and surfaced thousands of findings. Yet, when the board asks if the organization’s cloud risk is improving, the answer is a number without a story. When you need engineering to prioritize fixing issues, your request competes with every other item in an already-strained backlog. Finding issues isn’t the problem. The […]
Stop Chasing Ghosts: Why You Need Layer-Level Visibility in Your Container Images
The industry has a “shift left” problem. We’ve become excellent at scanning images and generating massive spreadsheets of vulnerabilities. But for most security teams, a scan result is just the start of a forensic investigation. You find a critical CVE, but then the real work begins: Is this in the base image? Did a developer […]
Beyond the Perimeter: Runtime Visibility for AWS Lambda
The industry has a snapshot problem. Static analysis and SCA tools tell you what might happen based on a manifest, but once a function is triggered, the execution environment becomes a black box. For most security teams, Lambda security is a “hope for the best” strategy. The “Old Way” relies on coarse-grained IAM policies and […]
Refining Your Workflow: A Faster, More Intuitive Upwind Experience
At Upwind, our goal has always been to provide deep visibility into your cloud environment without the “dashboard fatigue” that plagues so many security teams. We know that in the heat of a security incident, every second counts—and every click matters. That’s why we’ve rolled out a series of Platform Navigation Updates designed to make […]
Agentic Security Is Here — But Who Is Accountable When the AI Acts Alone?
TL;DR: Agentic security is the use of autonomous AI systems that detect, triage, and respond to threats without human intervention, which introduces a new category of operational risk. The most valuable security skill in 2026 is not prompt engineering or AI fluency. It’s consequence engineering: the ability to anticipate what happens when an autonomous system […]
From Nodes to Snakes: npm Supply Chain Attack Delivers Python Payload via axios
Executive Summary Our researchers and MDR team identified an npm supply chain attack involving malicious axios packages that leads to the execution of a Python-based payload on infected machines. The malware fingerprints the host, collects basic system and user environment data, and then communicates with attacker-controlled infrastructure to receive follow-on instructions. Rather than acting noisily, […]
The Revolution in Cloud Security Prioritization
In the modern cloud landscape, security teams are drowning in a deluge of vulnerabilities. Thousands of Common Vulnerabilities and Exposures (CVEs) lurk within base images, open-source libraries, and operating systems. While today’s security infrastructure is doing better at detection—scanning images, generating Software Bills of Materials (SBOMs), and identifying exposures at scale—the real battle has shifted. […]