
Why Securing AI Workloads Demands Runtime Protection, Now More Than Ever
As enterprises race to integrate GenAI and AI-powered applications, security leaders are confronting a new class of threats. Traditional tools weren’t built for the dynamic, high-risk nature of AI workloads. AI workloads introduce new capabilities, along with new risks. They dramatically increase the cloud attack surface by running code that adapts in real time, often […]

How Upwind Uses eBPF to Bring Real-Time Security to Cloud-Native Environments
Modern cloud-native environments offer unprecedented speed, scalability, and developer agility – but they also introduce complexity that traditional security tools struggle to manage. Containers spin up and down in seconds, microservices multiply rapidly, and infrastructure changes dynamically. Static logs and agent-based security solutions simply can’t keep up. That’s where eBPF comes in – and why […]

Navigating Kubernetes Security: Understanding the Risks and the Right Way to Stay Secure
Kubernetes, often called K8s, is revolutionizing how organizations deploy and manage containerized applications. Originally developed by Google and now open-source, Kubernetes has become a standard for orchestrating containers across on-premises, hybrid-cloud, and public cloud environments. But with this increased flexibility and scalability comes a new range of security challenges that require thoughtful, proactive solutions. In […]
Upwind CISO Fireside Chats: Episode 2
In this episode, we sit down with Jim Routh, former CISO at American Express, MassMutual, CVS, and more, for a conversation led by our CSO, Rinki Sethi. From accidentally becoming one of the industry’s first CISOs to redefining what leadership means in cybersecurity, Jim shares hard-earned insights on stakeholder management, runtime security, and the future […]
CISO Fireside Chats Ep. 1 with Lucas Moody
Today, we are introducing Upwind’s CISO Fireside Chats, where we are joined by leading CISOs to discuss the biggest topics in cloud security and risk management. In this premier episode, we sit down with Lucas Moody, SVP & CISO at Alteryx, for an open and honest conversation with our CEO, Amiram Shachar. From navigating the evolving threat landscape […]
CADR Webinar with James Berthoty and Joshua Burgin
Redefining Cloud Security with Cloud Application Detection & Response (CADR) Traditional cloud security approaches struggle to keep up with today’s evolving threats. Cloud Application Detection & Response (CADR) is changing the game—leveraging real-time insights to enhance protection and response capabilities. Join Analyst James Berthoty and Upwind CPO Joshua Burgin for an exclusive discussion on how CADR is transforming cloud security and what it means for your organization. […]

eBPF versus Kernel Extensions
Recent events in the world of cybersecurity have brought an influx of attention to a technology known as kernel extensions, and the serious risks that can arise when third-party programs that utilize this technology experience bugs and incompatibilities. So today, we thought it would be useful to dive into the two main approaches for building “agents” or […]

Leveraging eBPF for DevSecOps
eBPF is a revolutionary technology, originating from the Linux kernel. It is used to safely and efficiently extend the capabilities of the kernel without requiring changing the kernel source code or loading kernel modules/extensions. Today, eBPF is used extensively to: eBPF-Enriched Context eBPF is the base data layer that is needed in runtime cloud security. […]

What is Shift-Right Security?
A look at the need for a shift-right security approach that includes runtime detection and response.

The Evolution of EDR and CWPP
An in-depth look at the evolution of EDR, CWPP and CDR and their role in security organizations, evolving from endpoint detection and response to the more recent need for cloud workload protection and real-time response.