Seamlessly Integrate with Cloudflare Through the Upwind Platform

An orange and yellow background with a stylized white cloud design in the center. The word Upwind is at the top left corner in white text.

We are thrilled to announce a new integration with Cloudflare, bringing seamless and enhanced API security for Upwind users who leverage Cloudflare. Why Integrate with Cloudflare Cloudflare is an internet infrastructure and security company that helps organizations monitor and manage their API endpoints, providing additional security, monitoring and API traffic optimization. Its robust capabilities include […]

Proactively Secure Kubernetes Workloads with Upwind’s Runtime-Powered KSPM

A blue circle with the Kubernetes logo inside is in the center. The background features multiple faded, overlapping Kubernetes logos on a white backdrop. The word upwind is in the top left corner.

With the rise of containerized environments and Kubernetes adoption, Kubernetes security posture management (KSPM) has risen to the forefront of cloud security posture initiates. KSPM generally requires the use of security tools or processes to help ensure the security of Kubernetes clusters, with most focusing on policies and configurations. However, this focus on static configuration […]

Easily Query Kubernetes Objects with Upwind’s Runtime Topology Map 

Abstract design featuring large overlapping circles in shades of blue, with hexagonal patterns and a grid background. The word Upwind is in the upper left corner.

We’re excited to introduce a powerful new container security capability that makes it easier than ever to view and query Kubernetes objects while exploring the entire exposure path with Upwind’s runtime topology map. Upwind has always provided deep visibility into containerized resources, showing traffic by port, process, and protocol, as well as details into an […]

Introducing New Runtime Security Features for Modern Containerized Environments

Abstract pink and red circular design with a small shield icon containing a white virus symbol at the center. The image has a modern, minimalist style, accompanied by the text upwind in the top left corner.

At Upwind Security, we continuously enhance our security capabilities to address emerging threats and provide unparalleled runtime protection for containerized environments. In this update, we are excited to introduce new detection and prevention policies designed to secure workloads against sophisticated attacks.  Next-Generation Threat Detections Over the past several weeks we have added additional detection policies […]

Introducing Upwind Dashboards: Simplify Security Monitoring & Reporting

Illustration of a grid with two purple icons: a house on the left and a fingerprint on the right. The top left corner features the word upwind in black lowercase letters with a purple accent. The background is light with faint outlines.

We are introducing four powerful new dashboards in the Upwind platform to simplify monitoring and reporting for security executives. These four new dashboards each offer a high-level overview of security risk, performance over time, and prioritized risk analysis to focus you on what matters most.  Home Dashboard  This dashboard is Upwind’s new home page, providing executives with […]

A Year in Review: Looking Back at Upwind in 2024

A gradient-colored graphic with the word Upwind at the top, featuring large numbers 2024 in the center. Below, it says Year in Review on a backdrop of diagonal lines in pastel colors.

This year has been one of market penetration, expansion and innovation for Upwind. From exiting stealth in September 2023 to a little more than a year later, we expanded our global presence with offices in the UK, Iceland, Israel and the US, held a Series A, maintained a robust schedule of product innovation, and had […]

How Upwind Leverages AWS CloudTrail for Enhanced Threat Detection Capabilities

Diagram featuring colorful, dotted paths connecting cloud and security icons, including AWS. The upwind logo is in the top left corner. The background is white.

As a part of Upwind’s runtime-powered threat detection capabilities, the Upwind Platform integrates seamlessly with AWS CloudTrail to provide real-time monitoring and detection of cloud logs. By leveraging AWS CloudTrail Logs generated at runtime, Upwind is able to provide deep runtime context and automatically alert you to suspicious or malicious log events. What is CloudTrail? […]

Introducing The Next Generation of Shift Left Security, Powered by Runtime

Diagram showing a grid of 25 pink circles with warning symbols on the left transforming into a grid of 25 circles with only two pink warning symbols on the right. Arrows indicate transition from left to right. Upwind is in the top left corner.

Today, we’re thrilled to introduce Upwind Shift Left – a major new capability in the Upwind platform that brings the power of runtime intelligence to CI/CD pipelines, transforming how teams secure their software at every step. By marrying real-world runtime context with build-time best practices, this next-generation solution redefines shift left for modern cloud security. […]

Upwind Secures $100M to Power Next-Generation Cloud Security

Blue background with concentric contour lines and the word Upwind at the top. The text $100M is prominently displayed in the center, followed by SERIES A FUNDING ROUND at the bottom in smaller font.

Customers have always been our north-star. Being “Driven By Customers” is not just a paragraph written on our Careers page – it’s the way we operate on a daily basis. It is how we hire, promote, and give each other feedback at Upwind. It is also how we build products, prioritize features, and think about […]

Critical Kubernetes gitRepo Volume Vulnerability: CVE-2024-10220

White Kubernetes logo on a pink background with circular patterns. Text below reads, Arbitrary command execution through gitRepo volume (CVE-2024-10220).

A critical security vulnerability identified as CVE-2024-10220 has been discovered in Kubernetes’ deprecated gitRepo volume type. This vulnerability allows attackers with permissions to create pods using gitRepo volumes to execute arbitrary commands on the host node with root privileges, potentially leading to full system compromise. The gitRepo volume type was designed to clone Git repositories […]