eBPF versus Kernel Extensions

Recent events in the world of cybersecurity have brought an influx of attention to a technology known as kernel extensions, and the serious risks that can arise when third-party programs that utilize this technology experience bugs and incompatibilities. So today, we thought it would be useful to dive into the two main approaches for building “agents” or […]

Secure Google Cloud Identities with Upwind’s Human Identity Management

Upwind’s support for Human Identity Management in Google Cloud gives you the ability to easily surface, understand and fix risky misconfigurations including over-privileged or excessive permissions, ensuring a more secure Google Cloud environment. Managing human identities in the cloud can be incredibly challenging for organizations, especially when they use multiple cloud providers or different identity […]

How TTMZero Uses Upwind for DevSecOps

We recently published a case study with our customer TTMZero, highlighting how their team uses Upwind for a unified DevSecOps solution, leveraging real-time network visibility, runtime risk and remediation prioritization. “Upwind has exceeded our expectations in every area of our organization and completely transformed the way we do DevSecOps. We evaluated other tools and have […]

Upwind is Now Available Through Google Cloud Marketplace

We are excited to announce that Google Cloud users can purchase the Upwind Cloud Security Platform directly through Google Cloud Marketplace. To be listed on Google Cloud Marketplace, qualified vendors must complete a rigorous, exclusive process to be listed as a Google Cloud vendor. Upwind’s acceptance as a qualified vendor through Google Cloud Marketplace demonstrates […]

What Happened with the CrowdStrike Update?

A recent CrowdStrike Falcon sensor update has caused a massive Windows Blue Screen of Death (BSOD) outage. CrowdStrike offers endpoint protection and other services that are used on a widespread scale worldwide, and this sensor update issue is causing global issues. Impact There are widespread reports of BSOD error on Windows hosts, all of which […]

How Organizations Use Upwind’s File-Based Threat Monitoring

Upwind’s threat detection capabilities give you real-time protection against cloud attacks, including malicious file activities. Upwind’s lightweight, high-performance eBPF sensor goes beyond monitoring file activities to enrich that data with information about an event’s context and provide insights into the actions taken on the file, including read, write, and truncate (delete).  You can leverage this […]

Understanding Kubernetes Identities, Part 1

When it comes to Kubernetes, managing identities is pivotal for ensuring secure and efficient cluster operations. These identities can be human users or machines, each requiring specific permissions to perform their tasks. In our latest research, we have explored what Kubernetes identities are, the default identities, the permissions they can have, how to configure these […]

Upwind & H2O.ai Take the Stage at AWS Summit Tel Aviv

Upwind Field-CTO Tomer Hadassi and H2O.ai Cloud Engineering Manager Ophir Zahavi take the stage at AWS Summit Tel Aviv to discuss how Upwind empowers H2O.ai’s cloud security with runtime protection and build-time insights for end-to-end context and prioritized risk.

Monitor & Secure Cross-Account Roles with Upwind’s Non-Human Identity Security (NHI)

Upwind’s Non-Human Identity (NHI) Security streamlines your identity management and gives you the ability to easily view cross-account roles and their associated permissions. Cross-account roles are incredibly useful for organizations with multiple AWS accounts and permissions, but they can also be difficult to monitor and secure. Upwind helps solve this problem by providing increased visibility […]