Google Cloud Run Gets Direct Tracer Reporting for Scalable Runtime Security
Last year, we launched full security support for Google Cloud Run bringing posture management, real-time threat detection, vulnerability management, inventory discovery, and topology mapping to serverless container workloads. Teams using Cloud Run got the same Upwind coverage they already relied on for VMs and containers. Now we’re making that experience even simpler. With direct tracer […]
Drive Remediation, Show Progress: A New Way to Measure Cloud Security Posture
You’ve invested in security tools and surfaced thousands of findings. Yet, when the board asks if the organization’s cloud risk is improving, the answer is a number without a story. When you need engineering to prioritize fixing issues, your request competes with every other item in an already-strained backlog. Finding issues isn’t the problem. The […]
Stop Chasing Ghosts: Why You Need Layer-Level Visibility in Your Container Images
The industry has a “shift left” problem. We’ve become excellent at scanning images and generating massive spreadsheets of vulnerabilities. But for most security teams, a scan result is just the start of a forensic investigation. You find a critical CVE, but then the real work begins: Is this in the base image? Did a developer […]
Beyond the Perimeter: Runtime Visibility for AWS Lambda
The industry has a snapshot problem. Static analysis and SCA tools tell you what might happen based on a manifest, but once a function is triggered, the execution environment becomes a black box. For most security teams, Lambda security is a “hope for the best” strategy. The “Old Way” relies on coarse-grained IAM policies and […]
Refining Your Workflow: A Faster, More Intuitive Upwind Experience
At Upwind, our goal has always been to provide deep visibility into your cloud environment without the “dashboard fatigue” that plagues so many security teams. We know that in the heat of a security incident, every second counts—and every click matters. That’s why we’ve rolled out a series of Platform Navigation Updates designed to make […]
The Revolution in Cloud Security Prioritization
In the modern cloud landscape, security teams are drowning in a deluge of vulnerabilities. Thousands of Common Vulnerabilities and Exposures (CVEs) lurk within base images, open-source libraries, and operating systems. While today’s security infrastructure is doing better at detection—scanning images, generating Software Bills of Materials (SBOMs), and identifying exposures at scale—the real battle has shifted. […]
Introducing Upwind Data Security: Bringing Sensitive Data Risk Into Cloud Security Context
As cloud environments expand, so does the volume of sensitive data stored within them. For security teams, it is no longer enough to know whether a bucket is public or a workload is vulnerable. They also need visibility into a more fundamental question: what sensitive data exists across their cloud assets, and how does its […]
Expanding Compliance Coverage with New Industry Frameworks and Upwind’s Cloud Hygiene Framework
Cloud security teams are being asked to do more than ever. They need to prove compliance against growing regulatory demands, reduce configuration risk, and keep cloud environments lean, secure, and aligned with how they were actually designed to operate. That is why we are excited to introduce several new frameworks now available in Upwind’s Configurations […]
Upwind Audit Logs: Complete Traceability for Every Action in the Platform
When something changes in your cloud security platform, the first question is almost always the same: What happened and who did it? Upwind Audit Logs gives security and platform teams a centralized, searchable record of user-driven actions across the Upwind platform, including activity performed through the UI or Public API. The result is clearer accountability, […]
Upwind Runtime Protection Now Supports Azure
Cloud teams are moving fast on Azure PaaS to reduce operational overhead—serverless containers with Azure Container Apps and managed web apps with Azure App Services. But that speed often comes with a tradeoff: security visibility and detection can lag behind because you don’t have the same host access or deployment patterns you’d expect in Kubernetes […]