Upwind’s SBOM Explorer – Your Weapon for the Next 0-day Attack

We are excited to announce a new feature – Upwind’s Packages Tab. You can now view all of the packages in your environment and their dependencies in Upwind’s Packages Tab. This serves as an SBOM explorer, as it includes all packages (with or without vulnerabilities). With this capability, you can now search for all packages, […]
Labels & Tags Are the New Identities in the Cloud

Upwind is excited to announce a new capability – enhanced visibility of Labels & Tags Cardinality. What is Labels & Tags Cardinality?Cardinality gives you the ability to better understand how often and at what scale tags and labels are being used and what their values are across your resources. This helps you have a much […]
Automatically Find Exposed Secrets Across Your Cloud Workloads

Supercharge your cloud security with Upwind’s Exposed Secrets scanning! Exposed secrets include: Exposed secrets can cause serious damage to your organization if they fall into the wrong hands, potentially giving bad actors the opportunity to use these tokens to gain broader access to sensitive data and critical infrastructure. To keep this from happening, Upwind now […]
Automate Threat Detection & Response for Kubernetes Workloads

Upwind’s real-time threat detection capabilities have helped our customers identify threats and bad actors the moment they enter their cloud environment. This real-time, runtime-powered capability is the definition of shift-right security, and we have now taken it one step further by providing the ability to respond to threats as soon as they are detected. With […]
Seamless Hybrid-Cloud Security with Upwind’s BYOC

We are excited to announce the launch of a significant new capability within the Upwind platform – Bring Your Own Cloud (BYOC)! Upwind has always supported cloud-native and multi-cloud environments across AWS, Azure and GCP, and starting today, you can also connect to other cloud providers such as Oracle and IBM Cloud or your hybrid […]
Know Who Your Resources Talk To With Upwind’s Destination Domain Capabilities

Introducing Upwind’s new capability – Destination Domain Identification! Starting now, you can view resource communication with DNS destinations such as egress domains traffic or even internal DNS destinations such as databases and internal domains. This helps you to understand and secure your runtime environment even further. Upwind uses this data for its threat detection engine […]
A New Deadly Combination in Nginx

Recently a deadly combination of vulnerabilities emerged, posing a severe threat to Kubernetes clusters utilizing Ingress-Nginx. By exploiting three critical vulnerabilities: attackers can execute arbitrary code and escalate privileges, all with access to the Nginx Annotation object. These vulnerabilities have been confirmed in both NGINX and Kubernetes/Ingress-Nginx, as reported by Google and various GitHub issues. […]
Identify Threats & Risks in a LinkerD-based Kubernetes Environment

We are excited to announce a new capability – LinkerD awareness. LinkerD is a service mesh that allows organizations to secure, connect and monitor traffic to Kubernetes. Upwind will now identify LinkerD sidecars and proxies, in addition to our current Istio monitoring, and use this information as context for our threat detection and risk prioritization […]
Seamlessly Integrate Threat Detections into Your Workflows with Upwind’s Workflow Management

Announcing Upwind’s new capability – streamlined workflow management! Using Upwind’s Workflow Management, you can easily create workflows that streamline your remediation process. You can customize your workflow by choosing: Leverage Upwind’s Workflow Management capabilities to create multiple streamlined workflows and ensure the right team members are receiving the most relevant alerts and tickets. Integrate with […]
Why Talking with Generative AI Might Be Dangerous

Large Language Models (LLMs) have emerged as game-changers in the rapidly evolving realm of artificial intelligence. While LLMs promise revolutionary capabilities such as analyzing vast datasets, mastering language nuances, and predicting user behavior, they also raise multiple security concerns that users should be aware of. Spotlight: LangChain, the MVP of LLM-Driven Applications LangChain is a […]