Back to all posts
Illustration of a stylized lighthouse with red and beige stripes, standing on a wavy blue base, set against a light blue background. The word upwind appears in the top right corner, symbolizing the strategic direction-taking akin to EDR vs MDR decisions.

EDR vs. MDR

Endpoints are an issue. That doesn’t always mean they need a dedicated solution. And if they do, does that include management and security across layers? We’ve explored CDR as a standalone strategy and tool (today, it’s typically part of cloud-native application protection platforms, or CNAPP, solutions), and hacked out the differences between EDR and CDR. […]

Illustration of a stylized Earth with blue continents and green oceans, surrounded by overlapping blue ovals radiating outward. The word upwind is in the top-left corner on a light gray background.
Product

Automatically Visualize Kubernetes Ingress Traffic in the Upwind Topology Map

We are excited to announce a new capability in the Upwind platform, providing organizations with deep visibility into Kubernetes’ ingress traffic to identify exposures and risks. Traditional security systems often fall short in providing comprehensive visibility into how Kubernetes ingress services distribute incoming internet traffic within a cluster, leaving potential blind spots that malicious actors […]

A padlock featuring a brain symbol at its center, representing AI security, stands out against a light purple background. The logo upwind is elegantly positioned in the top right corner.

AI Security Explained

Artificial intelligence (AI) is transforming industries, but it also introduces new security risks that traditional security measures don’t tackle. For example, AI models can be poisoned, manipulated, stolen, or exploited through adversarial techniques or unauthorized access. That makes AI security critical. It protects business assets that rely on AI and secures AI itself from emerging […]

Pink, yellow, and red circles with shield and gear icons are scattered across a white background. The word upwind is in the top left corner. One central red circle is prominently highlighted.
Product

Streamline Cloud Threat Detection and Response with Upwind’s Major Threats Module Enhancements

Cloud security teams are drowning in alerts, struggling to prioritize real threats among endless notifications. To help security professionals cut through the noise, we are thrilled to announce major enhancements to our Threats Module, further empowering security professionals to understand deep context for every threat detection, identify emerging threat actors, and respond to threats faster.  […]

Flowchart showing a central purple cube connected by lines to various circular icons representing different technology tools and platforms, including Earth globes, cloud storage, and development frameworks. The upwind logo is at the top left.
Product

Why a Next-Generation CSPM Needs Runtime

In today’s rapidly evolving cloud environments, maintaining a robust security posture is more critical than ever. Traditional Cloud Security Posture Management (CSPM) solutions have played a pivotal role in identifying misconfigurations and policy violations within cloud infrastructures. However, as cloud architectures become increasingly dynamic, the sheer volume of misconfiguration findings can present an insurmountable challenge […]

A flowchart with interconnected blue circles containing icons. Arrows in green, yellow, and blue link the circles. A small blue circle with a power icon is at the top left. The upwind logo is in the top left corner.
Product

Automatically View High-Privilege Identity Insights in the Upwind Topology Map

We’re excited to introduce a powerful new capability in the Upwind Cloud Security Platform –  enhancing security by providing seamless visibility into highly privileged identities for every containerized resource in your cloud environment. Now available directly in the Upwind Topology Map, this feature helps detect and mitigate excessive permissions, reducing the risk of privilege escalation […]

Illustration of a cargo ship with turquoise containers on a blue background, showcasing a simple, geometric style. The word Upwind floats in the top right corner, symbolizing navigating through digital seas much like how Kubernetes Alternatives steer software deployments.

Kubernetes Alternatives for Containerization

Although Kubernetes is the most popular container orchestration platform in the market, that doesn’t mean there are no alternatives. As the container ecosystem expands, there are increasingly open-source and cloud-provider tools that might offer more effective solutions to managing containers for any given organization. In this article, we’ll examine why teams may want to move […]

Flowchart with a central icon and surrounding elements: trophy, bug, database, microchip, brackets, fingerprint, lock, and star. Lines connect each icon to the center, illustrating interconnectedness. Upwind logo in the top left corner.
Product

Easily Prioritize Vulnerabilities Based on Real Environmental Risks with Upwind

We are excited to announce a significant enhancement to Upwind’s vulnerability management capabilities – prioritization of vulnerabilities based on highly privileged identities and sensitive data context. Upwind has always deeply prioritized vulnerabilities based on real-world context, correlating them with CI/CD and DevOps context to provide end-to-end visibility and protection.  With this latest enhancement, Upwind now also […]

Flowchart showing interconnected blue nodes with document icons linked by colored lines. Central node connected to a white rectangle with the text upwind + followed by a blue cube logo. Lines are colored blue, green, and orange.
Product

Proactively Secure Google Cloud Workloads with Upwind’s GKE Autopilot Integration

We are excited to announce that Upwind is now an official Google Kubernetes Engine (GKE) Autopilot partner, enabling users to seamlessly deploy Upwind and proactively secure Google Cloud workloads. Many GKE Autopilot users struggle with securing their workloads due to limited control over infrastructure and security configurations. Upwind’s integration ensures a seamless, built-in security solution […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.