Connect the Dots for Security Findings with Upwind’s Threat Stories

Circular diagram with a central orange scroll icon, surrounded by concentric circles of blue and pink dots. The upwind logo is in the top left corner.

We are excited to announce the release of Upwind’s “Threat Stories” – a GenAI-based capability designed to address the challenge of connecting the dots between seemingly isolated security findings. By providing a unified narrative that consolidates and contextualizes events Upwind has determined to be related, Threat Stories enhance the comprehensiveness of our detections with detailed […]

Detect Malicious File Activities 

Diagram with a bee in the center surrounded by blue and red arrows. Blue arrows lead to icons of documents and alerts, while red arrows lead to security symbols. The word upwind is in the top left corner.

We are excited to announce a significant new capability in the Upwind Cloud Security Platform – threat detections for malicious file-based activity. Upwind’s threat detection and response capabilities have always allowed customers to detect and respond to threats in real time, powered by our innovative eBPF-based sensor. With this new capability, Upwind’s threat detection capabilities […]

Upwind is Named ‘Best Runtime Cloud Security Solution’

A row of surfboards with palm trees in the background, featuring a 2024 Cybersecurity Excellence Awards badge. Text reads Best Cloud Runtime Cybersecurity Solution next to the logo upwind on a blue gradient background.

Upwind has been named the Best Cloud Runtime Security Solution by the Cybersecurity Excellence Awards! This prestigious award recognizes our commitment to developing innovative solutions that protect organizations in the cloud. All of us at Upwind are incredibly humbled to receive this award, which is a testament to our team’s hard work and dedication to building a […]

Detect Exposed Kubernetes Dashboards

Diagram showing a central Kubernetes logo with various red and blue dashed arrows pointing towards and away from it. Some arrows have icons like a warning sign and container symbols. The upwind logo is in the top left corner.

We are excited to announce a new threat detection, with the ability to identify an exposed Kubernetes Dashboard. This threat detection will inform you when the Kubernetes dashboard for your cluster is exposed to the internet by a Load Balancer.  Exposing your dashboard to the internet makes the management interface of your cluster vulnerable to […]

Easily Understand & Intelligently Secure Human & Machine Identities

Illustration of two large cargo ships at sea under a clear sky. The ships carry colorful containers with crown symbols. The text Upwind is in the top left corner, and DevOps-Airflow-Role is on the side of the foremost ship.

In the ever changing and complex cloud infrastructure landscape, organizations must not only protect their cloud infrastructure and applications from external threats, but also secure them from internal human and machine identities through the practice of Cloud Identity Entitlement Management (CIEM). Managing identities presents multiple challenges, ranging from the need for thorough auditing and generating compliance […]

Pinpoint Vulnerability Origins With Complete Visibility into Container Image Layers

An illustration featuring a crane lifting several server racks with Kubernetes and Keycloak logos. The background includes large digital storage units. Labels on the racks display data strings and the name Upwind.

We are excited to release an important new capability – container image layer visibility. A Docker build consists of a series of ordered build instructions. A layer, or image layer, is a change in an image, or an intermediate image. Every command specified (FROM, RUN, COPY, etc.) in a Dockerfile causes the previous image to change, […]

Evaluating Microsoft’s Cyber Hack

A black background features a colorful border transitioning from purple to blue. A white, four-square logo is on the top left with the text Evaluating Microsofts Cyber Hack below it, and Upwind in the top right corner.

Russian state-sponsored threat actor Nobelium recently attacked Microsoft and hacked numerous accounts using a password-spray attack. This allowed them to access a test account and gain access to Microsoft corporate email accounts, including senior leaders. After gaining access, they were able to operate within Microsoft’s infrastructure for more than two months before being discovered. This […]

Filter Your Network Topology in Real Time

Illustration of green islands on a blue grid background labeled Upwind Map Views. Text below reads Predefined & User Defined Cloud Topology Map Views, suggesting customizable cloud topology maps.

We are excited to announce a new capability – custom runtime topology map views. This allows you to view Upwind’s runtime topology map with predefined filters including riskiest resources and resources with active internet ingress. We will be constantly adding new out-of-the-box views, and you can also create your own custom views with any combination […]

Major Themes from KubeCon + CloudNative 2023

A vibrant blue gradient background image featuring the logos for KubeCon and CloudNativeCon North America 2023 at the top. The text Major Themes is centered, with upwind written at the bottom.

Taking the time to attend KubeCon, even though I just attended virtually this year, is always a great way to keep up with what is happening in the Kubernetes & Cloud communities. There are technologies to dive into, products to explore, interesting lectures to see and a chance to meet with peers, either online or […]

Automate Threat Detection & Response for Kubernetes Workloads

Screenshot of the Upwind platform showing response details in a table against a gradient background. The table includes timestamps, response statuses, and various metrics. Success status is highlighted in green.

Upwind’s real-time threat detection capabilities have helped our customers identify threats and bad actors the moment they enter their cloud environment. This real-time, runtime-powered capability is the definition of shift-right security, and we have now taken it one step further by providing the ability to respond to threats as soon as they are detected. With […]