Seamlessly Integrate with Cloudflare Through the Upwind Platform
We are thrilled to announce a new integration with Cloudflare, bringing seamless and enhanced API security for Upwind users who leverage Cloudflare. Why Integrate with Cloudflare Cloudflare is an internet infrastructure and security company that helps organizations monitor and manage their API endpoints, providing additional security, monitoring and API traffic optimization. Its robust capabilities include […]
Proactively Secure Kubernetes Workloads with Upwind’s Runtime-Powered KSPM
With the rise of containerized environments and Kubernetes adoption, Kubernetes security posture management (KSPM) has risen to the forefront of cloud security posture initiates. KSPM generally requires the use of security tools or processes to help ensure the security of Kubernetes clusters, with most focusing on policies and configurations. However, this focus on static configuration […]
Easily Query Kubernetes Objects with Upwind’s Runtime Topology Map
We’re excited to introduce a powerful new container security capability that makes it easier than ever to view and query Kubernetes objects while exploring the entire exposure path with Upwind’s runtime topology map. Upwind has always provided deep visibility into containerized resources, showing traffic by port, process, and protocol, as well as details into an […]
Introducing New Runtime Security Features for Modern Containerized Environments
At Upwind Security, we continuously enhance our security capabilities to address emerging threats and provide unparalleled runtime protection for containerized environments. In this update, we are excited to introduce new detection and prevention policies designed to secure workloads against sophisticated attacks. Next-Generation Threat Detections Over the past several weeks we have added additional detection policies […]
Introducing Upwind Dashboards: Simplify Security Monitoring & Reporting
We are introducing four powerful new dashboards in the Upwind platform to simplify monitoring and reporting for security executives. These four new dashboards each offer a high-level overview of security risk, performance over time, and prioritized risk analysis to focus you on what matters most. Home Dashboard This dashboard is Upwind’s new home page, providing executives with […]
A Year in Review: Looking Back at Upwind in 2024
This year has been one of market penetration, expansion and innovation for Upwind. From exiting stealth in September 2023 to a little more than a year later, we expanded our global presence with offices in the UK, Iceland, Israel and the US, held a Series A, maintained a robust schedule of product innovation, and had […]
How Upwind Leverages AWS CloudTrail for Enhanced Threat Detection Capabilities
As a part of Upwind’s runtime-powered threat detection capabilities, the Upwind Platform integrates seamlessly with AWS CloudTrail to provide real-time monitoring and detection of cloud logs. By leveraging AWS CloudTrail Logs generated at runtime, Upwind is able to provide deep runtime context and automatically alert you to suspicious or malicious log events. What is CloudTrail? […]
Introducing The Next Generation of Shift Left Security, Powered by Runtime
Today, we’re thrilled to introduce Upwind Shift Left – a major new capability in the Upwind platform that brings the power of runtime intelligence to CI/CD pipelines, transforming how teams secure their software at every step. By marrying real-world runtime context with build-time best practices, this next-generation solution redefines shift left for modern cloud security. […]
Upwind Secures $100M to Power Next-Generation Cloud Security
Customers have always been our north-star. Being “Driven By Customers” is not just a paragraph written on our Careers page – it’s the way we operate on a daily basis. It is how we hire, promote, and give each other feedback at Upwind. It is also how we build products, prioritize features, and think about […]
Critical Kubernetes gitRepo Volume Vulnerability: CVE-2024-10220
A critical security vulnerability identified as CVE-2024-10220 has been discovered in Kubernetes’ deprecated gitRepo volume type. This vulnerability allows attackers with permissions to create pods using gitRepo volumes to execute arbitrary commands on the host node with root privileges, potentially leading to full system compromise. The gitRepo volume type was designed to clone Git repositories […]