Connect the Dots for Security Findings with Upwind’s Issue Stories

We are excited to announce the release of Upwind’s “Issue Stories” – a GenAI-based capability designed to address the challenge of connecting the dots between seemingly isolated security findings. By providing a unified narrative that consolidates and contextualizes events Upwind has determined to be related, Issue Stories enhance the comprehensiveness of our existing Issue types […]

Detect Malicious File Activities 

We are excited to announce a significant new capability in the Upwind Cloud Security Platform – threat detections for malicious file-based activity. Upwind’s threat detection and response capabilities have always allowed customers to detect and respond to threats in real time, powered by our innovative eBPF-based sensor. With this new capability, Upwind’s threat detection capabilities […]

Upwind is Named ‘Best Runtime Cloud Security Solution’

Upwind has been named the Best Cloud Runtime Security Solution by the Cybersecurity Excellence Awards! This prestigious award recognizes our commitment to developing innovative solutions that protect organizations in the cloud. All of us at Upwind are incredibly humbled to receive this award, which is a testament to our team’s hard work and dedication to building a […]

Detect Exposed Kubernetes Dashboards

We are excited to announce a new threat detection, with the ability to identify an exposed Kubernetes Dashboard. This threat detection will inform you when the Kubernetes dashboard for your cluster is exposed to the internet by a Load Balancer.  Exposing your dashboard to the internet makes the management interface of your cluster vulnerable to […]

Easily Understand & Intelligently Secure Human & Machine Identities

In the ever changing and complex cloud infrastructure landscape, organizations must not only protect their cloud infrastructure and applications from external threats, but also secure them from internal human and machine identities through the practice of Cloud Identity Entitlement Management (CIEM). Managing identities presents multiple challenges, ranging from the need for thorough auditing and generating compliance […]

Pinpoint Vulnerability Origins With Complete Visibility into Container Image Layers

We are excited to release an important new capability – container image layer visibility. A Docker build consists of a series of ordered build instructions. A layer, or image layer, is a change in an image, or an intermediate image. Every command specified (FROM, RUN, COPY, etc.) in a Dockerfile causes the previous image to change, […]

Evaluating Microsoft’s Cyber Hack

Russian state-sponsored threat actor Nobelium recently attacked Microsoft and hacked numerous accounts using a password-spray attack. This allowed them to access a test account and gain access to Microsoft corporate email accounts, including senior leaders. After gaining access, they were able to operate within Microsoft’s infrastructure for more than two months before being discovered. This […]

Filter Your Network Topology in Real Time

We are excited to announce a new capability – custom runtime topology map views. This allows you to view Upwind’s runtime topology map with predefined filters including riskiest resources and resources with active internet ingress. We will be constantly adding new out-of-the-box views, and you can also create your own custom views with any combination […]

Major Themes from KubeCon + CloudNative 2023

Taking the time to attend KubeCon, even though I just attended virtually this year, is always a great way to keep up with what is happening in the Kubernetes & Cloud communities. There are technologies to dive into, products to explore, interesting lectures to see and a chance to meet with peers, either online or […]

Automate Threat Detection & Response for Kubernetes Workloads

Upwind’s real-time threat detection capabilities have helped our customers identify threats and bad actors the moment they enter their cloud environment. This real-time, runtime-powered capability is the definition of shift-right security, and we have now taken it one step further by providing the ability to respond to threats as soon as they are detected. With […]