Back to all posts
A stylized bitcoin symbol sits in the center of a sunburst design with a peach background, hinting at the mysterious world of digital currencies and posing the question, What is Cryptojacking? The symbol is surrounded by wavy, white lines. The word upwind is in the top right corner.

What is Cryptojacking?

Cryptojacking gained prominence in 2017 when browser-based mining made the exploitation of systems to produce cryptocurrency without the permission of users possible. Ever since, cloud-native environments have had to be on guard against this threat. But cryptojacking can be an overlooked threat. It’s not a risky unknown, like a Zero Day threat. And it’s often […]

A white cloud icon on a light purple background showcases two arrows, one pointing left and one right. Upwind is elegantly inscribed in the top right corner, subtly hinting at cloud migration security with its design.

Cloud Migration Security

Cloud migration security isn’t just about securing data in transit or ensuring compliance (those are foundational parts of a successful migration). It’s about mitigating deep, systemic risks that arise when shifting workloads from on-prem to cloud. That means that cloud migration security is not a one-time checklist but a strategic shift in visibility, control, and […]

Illustration of a partially charged battery icon with a red level indicator and a lightning bolt symbol against a soft pink background. The word Upwind appears in the top right corner, subtly hinting at the energy flow akin to discussing, What is Container Runtime Interface?.

What is Container Runtime Interface (CRI)?

Apps and their dependencies don’t run on their own — they need container runtimes to help power their execution by providing the right environment, resource management, and lifecycle operations for containers. While we’ve covered container runtimes and container runtime security, we haven’t looked at a foundational component of containers themselves — the Container Runtime Interface […]

A black padlock icon featuring a cloud symbol sits against a purple backdrop, subtly hinting at the question, What is Cloud Workload Security? The word upwind appears in crisp white text in the top right corner.

What is Cloud Workload Security?

There are a variety of approaches to workload security, ranging from zero-trust to network segmentation, agents or agentless – and more. Cloud workloads need securing, but the details of how to achieve a secure environment best, without standing in the way of agile development, make the roadmap to workload security less than direct.  We’re breaking […]

A red and white lifebuoy featuring a lightning bolt symbol at its center is enclosed by a dotted line square with blue capsule corners on a pink gradient background. In the upper right corner, the intriguing question What is Runtime Security? complements the design above the word upwind.

What is Runtime Security?

We’ve talked about container runtime security, but not all runtime security involves containers. In this article, we’re broadly exploring runtime security on its own, asking questions like: Is it effective in hybrid and multi-cloud environments? How can you integrate it into your larger security stack? Is it possible to get more out of runtime security […]

The AWS logo is encircled by sleek, stylized orange container shapes on a beige background, subtly hinting at the question, "What Are AWS Containers?" The word "upwind" graces the top right corner.

Running Containers on AWS: A Complete Guide

Running containers on Amazon Web Services (AWS) offers flexibility and scalability for modern application architectures, but it also introduces unique security, management, and compliance challenges. We’ve already discussed unique aspects of AWS container security. In this article, we take a broader view of the unique features of AWS containers that you need to know about […]

A vivid illustration of a red and white striped lighthouse stands on a small gray island, rising through blue waves against a light green background. "Zero-Day Attack Prevention Explained" is subtly inscribed in the top right corner, adding an intriguing layer to the tranquil scene.

Zero-Day Attack Prevention Explained

Sure, teams know they should be patching quickly. But patches aren’t always available for brand-new vulnerabilities, leaving teams to wonder whether it’s practical to try to prevent these zero-day attacks. After all, zero-day attacks involve, by definition, vulnerabilities that have never been seen before and that organizations don’t know exist. We’ve already looked at what […]

Diagram illustrating a central organized structure with one large and one small orange box, akin to AWS Fargate's efficient orchestration. Dotted lines connect three smaller units, each having two boxes. The Upwind logo is in the top right corner against a peach background.

The Basics of AWS Fargate

With the wide adoption of containerized applications, there’s an increasing demand for solutions that simplify container management in cloud environments. Amazon Web Services (AWS) Fargate aims to fill this gap by offering a serverless computing platform that streamlines container deployment without requiring developers to manage the underlying infrastructure. While AWS Fargate can make life easier […]

Illustration of a stylized red lung with a fitness tracker strapped around it, set against a pink background, hinting at strength. The word Upwind is in the top right corner, much like asking "What Is Secure SDLC?" invites exploration into robust protection.

What Is Secure Software Development Lifecycle (Secure SDLC)?

Since the mid-2010s, teams have increasingly managed security tasks alongside development. The emergence of DevSecOps has helped organizations shift security left and incorporate security earlier in the development process, though that approach hasn’t always helped with agility and scaling. We’re looking at what secure SDLC solutions look like, including their real-world challenges.  What is SDLC? […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.