
EDR vs. MDR
Endpoints are an issue. That doesn’t always mean they need a dedicated solution. And if they do, does that include management and security across layers? We’ve explored CDR as a standalone strategy and tool (today, it’s typically part of cloud-native application protection platforms, or CNAPP, solutions), and hacked out the differences between EDR and CDR. […]

Automatically Visualize Kubernetes Ingress Traffic in the Upwind Topology Map
We are excited to announce a new capability in the Upwind platform, providing organizations with deep visibility into Kubernetes’ ingress traffic to identify exposures and risks. Traditional security systems often fall short in providing comprehensive visibility into how Kubernetes ingress services distribute incoming internet traffic within a cluster, leaving potential blind spots that malicious actors […]

AI Security Explained
Artificial intelligence (AI) is transforming industries, but it also introduces new security risks that traditional security measures don’t tackle. For example, AI models can be poisoned, manipulated, stolen, or exploited through adversarial techniques or unauthorized access. That makes AI security critical. It protects business assets that rely on AI and secures AI itself from emerging […]

Streamline Cloud Threat Detection and Response with Upwind’s Major Threats Module Enhancements
Cloud security teams are drowning in alerts, struggling to prioritize real threats among endless notifications. To help security professionals cut through the noise, we are thrilled to announce major enhancements to our Threats Module, further empowering security professionals to understand deep context for every threat detection, identify emerging threat actors, and respond to threats faster. […]

Why a Next-Generation CSPM Needs Runtime
In today’s rapidly evolving cloud environments, maintaining a robust security posture is more critical than ever. Traditional Cloud Security Posture Management (CSPM) solutions have played a pivotal role in identifying misconfigurations and policy violations within cloud infrastructures. However, as cloud architectures become increasingly dynamic, the sheer volume of misconfiguration findings can present an insurmountable challenge […]

Automatically View High-Privilege Identity Insights in the Upwind Topology Map
We’re excited to introduce a powerful new capability in the Upwind Cloud Security Platform – enhancing security by providing seamless visibility into highly privileged identities for every containerized resource in your cloud environment. Now available directly in the Upwind Topology Map, this feature helps detect and mitigate excessive permissions, reducing the risk of privilege escalation […]

Kubernetes Alternatives for Containerization
Although Kubernetes is the most popular container orchestration platform in the market, that doesn’t mean there are no alternatives. As the container ecosystem expands, there are increasingly open-source and cloud-provider tools that might offer more effective solutions to managing containers for any given organization. In this article, we’ll examine why teams may want to move […]

Easily Prioritize Vulnerabilities Based on Real Environmental Risks with Upwind
We are excited to announce a significant enhancement to Upwind’s vulnerability management capabilities – prioritization of vulnerabilities based on highly privileged identities and sensitive data context. Upwind has always deeply prioritized vulnerabilities based on real-world context, correlating them with CI/CD and DevOps context to provide end-to-end visibility and protection. With this latest enhancement, Upwind now also […]

Proactively Secure Google Cloud Workloads with Upwind’s GKE Autopilot Integration
We are excited to announce that Upwind is now an official Google Kubernetes Engine (GKE) Autopilot partner, enabling users to seamlessly deploy Upwind and proactively secure Google Cloud workloads. Many GKE Autopilot users struggle with securing their workloads due to limited control over infrastructure and security configurations. Upwind’s integration ensures a seamless, built-in security solution […]

Easily Visualize S3 Bucket Communication on the Upwind Topology Map
We are excited to announce a powerful new capability in the Upwind platform – enhancing security and operational efficiency by allowing you to easily visualize specific S3 buckets that resources are communicating with in the Upwind Topology Map. Upwind previously provided the ability to discover the specific S3 buckets that your assets are communicating with, […]