Back to all posts
Illustration of a green radar screen with a sweeping white arm and dots indicating objects. The background is light blue, subtly hinting at the vigilance needed in EDR for cyber security, while the word upwind sits confidently in the top right corner.

What is EDR in Cyber Security?

Endpoints remain a commonly targeted attack surface in cybersecurity. From ransomware and credential theft to fileless malware and insider threats, attackers exploit endpoints as an entry point to infiltrate networks, escalate privileges, and steal data. The challenge isn’t just that attacks happen — it’s that they move fast, and traditional tools lack the visibility to […]

An illustration of a padlock at the center, symbolizing container architecture for security, is connected to four rectangular shapes in a cross pattern on a light blue background. The upwind logo is prominently displayed at the top right corner.

Container Architecture for Security

From monolithic to hybrid architectures and beyond, part of ensuring that containerized applications remain secure is how they’re constructed. And while it’s common for DevOps teams to implement containers without considering how to protect them against compromise or ensure high availability, it often leads to a mix of cloud architectures and security concerns. We’ve discussed […]

A green battery icon with a check mark inside a rectangle, symbolizing full charge or approval. The backdrop is a light pastel green, subtly hinting at container security best practices, with the word Upwind elegantly placed in the top right corner.

Container Security Best Practices

Many teams already know what container security tools are out there, the basics of running containers on different platforms like Amazon Web Services, and the fundamentals of cloud workloads. But container security doesn’t stop there. The real challenges come when you have to secure thousands of short-lived workloads, keep visibility intact as teams scale, and […]

A blue padlock icon inside a white circle with a swirling design on a light blue background. The word upwind is in the top-right corner, subtly hinting at the importance of security measures like CIS Benchmarks.

What Are CIS Benchmarks?

Companies voluntarily align with frameworks like CIS Benchmarks to meet customer expectations, ensure audit readiness, and build trust. These Benchmarks provide prescriptive guidelines for hardening systems, but their adoption isn’t just about ticking boxes — it’s about proving that security controls meet the highest standards in increasingly competitive and regulated markets. Aligning with CIS Benchmarks […]

An abstract illustration of two connected bottle shapes, one blue and one red, with a central black band and a white border, evokes the essence of balance akin to the Shared Responsibility Model. The background is a light blue gradient with the upwind logo in white at the top right corner.

The Shared Responsibility Model in Cloud Security: Who Owns What?

The fragmented nature of responsibilities in cloud security — shaped by the specific cloud service model — means CSPs may secure infrastructure, operating systems, or platforms, while customers are responsible for protecting their data, applications, and configurations. However, nuanced differences and enforcing policies across clouds often throw a wrench into this otherwise straightforward division of […]

Cloud icon with three blue raindrops on a light blue background. The word Upwind appears in white text in the top right corner.

Understanding and Mitigating Cloud Vulnerabilities

As organizations scale their cloud environments, the complex challenge of securing an ever-expanding attack surface threatens to derail strategic tech goals. The interconnected nature of cloud services, paired with shared responsibility models, often results in vulnerabilities and gaps that adversaries exploit. This article unpacks some key cloud vulnerabilities and discusses actionable strategies for mitigating them.  […]

Illustration of a broken purple candy against a blue backdrop, subtly evoking the intricate investigation methods akin to Digital Forensics and Incident Response (DFIR), with the word upwind gracing the top right corner.

What is Digital Forensics and Incident Response (DFIR)?

In the alphabet soup of cybersecurity — ranging from SIEM (Security Information and Event Management) to IAM (Identity and Access Management), SOC (Security Operations Center), GRC (Governance, Risk, and Compliance), and others — DFIR stands out because it handles the post-compromise investigative response rather than preventive measures or policy frameworks. Do you need to add […]

Illustration of a blue and white eraser with a Kubernetes logo on one side, set against a light blue background. The word "upwind" appears in the top right corner, subtly hinting at curiosity: What are Kubernetes vulnerabilities?

What are Kubernetes Vulnerabilities?

For security teams, Kubernetes isn’t just another box to check. While this dynamic system is often the core of modern cloud deployments, its vulnerabilities aren’t static. New issues appear suddenly and from a mix of factors — complexity in configuration, rapid innovation, and a vast ecosystem of tools and extensions. New attack vectors also emerge […]

The image features an orange lambda symbol crafted from carrot illustrations against a light blue backdrop. In the top right corner, the word "upwind" appears, subtly hinting at concepts like "What is AWS Lambda Security?" through its artistic design.

What is AWS Lambda Security?

AWS (Amazon Web Services) Lambda is a serverless compute service that manages infrastructure so clients can run code in response to events without provisioning servers. Its ephemeral nature means that each instance is stateless and disposed of after execution — but what does that mean for organizational security? We’re talking about best practices and how […]

An illustration of a grid with blocks featuring padlock symbols, some locked and others open, highlights container security. The soft purple background adds depth, while the term "upwind" graces the top right corner, hinting at the question: What Is Container Security?

What Is Container Security?

As more organizations have shifted to a cloud-native deployment method and system architecture, containers and other cloud technologies have taken on new importance, as well as new security concerns. This blog post will take a deep dive into the challenges and best practices around container security, as well as provide tips for how to ensure […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.