Back to all posts
CIS AKS
Product

Upwind Delivers Faster Time-To-Value for CIS AKS

We’re excited to announce that Upwind now supports the Center for Internet Security (CIS) benchmark for Azure Kubernetes Service (AKS), helping security and compliance teams move faster with ongoing posture checks, active threat detection, and automated enforcement. With this release, customers can apply the same runtime-aware compliance capabilities already used across frameworks such as HIPAA, […]

API plus Infra
Product

Consolidate Cloud Security Tools with API and Infrastructure Protection 

Most cloud security platforms are built on static assumptions – scanning code, configs, and assets to guess where risk might exist. At Upwind, we took a fundamentally different approach: we built our platform on runtime. By capturing real-time signals directly from the kernel, Upwind delivers deep, continuous visibility into how workloads, APIs, identities, and data actually […]

K8S Sensor install Update
Product

Runtime Security in Minutes: Upwind’s New Sensor Installation Experience 

One of Upwind’s core advantages begins the moment runtime data is collected. That’s the moment teams stop guessing and start securing based on what’s actually happening in their clusters. From there, they gain meaningful visibility into workload behavior, identify real risks, and apply security policies based on observed activity rather than assumptions. To help teams […]

Upwind Data Security Framework-
Product

Secure Data in Rest and Transit with Upwind’s Runtime-Powered Data Security Posture Framework

Sensitive data is the crown jewel of every organization and the primary target for attackers. But in modern cloud environments, it’s increasingly difficult to answer key questions, like, “Where is our data? How is it used? What’s putting it at risk?” Consider the example shown below – an organization has security tooling in place, but […]

eBPF_Blog_Hero
White Paper

How Upwind Uses eBPF to Bring Real-Time Security to Cloud-Native Environments

Modern cloud-native environments offer unprecedented speed, scalability, and developer agility – but they also introduce complexity that traditional security tools struggle to manage. Containers spin up and down in seconds, microservices multiply rapidly, and infrastructure changes dynamically. Static logs and agent-based security solutions simply can’t keep up. That’s where eBPF comes in –  and why […]

Threat Stories-b
Product

Why Cloud Threat Detection Needs a Rethink – And How Upwind Delivers It

As organizations continue to scale their cloud-native applications across multi-cloud and hybrid-cloud environments, the complexity of threat detection has reached a new high. Traditional, signature-based approaches are no longer sufficient – they often fail to catch modern attacks that unfold subtly across layers of infrastructure and identity. Upwind introduces a powerful new approach to cloud […]

Navigating-K8s-Security-
White Paper

Navigating Kubernetes Security: Understanding the Risks and the Right Way to Stay Secure

Kubernetes, often called K8s, is revolutionizing how organizations deploy and manage containerized applications. Originally developed by Google and now open-source, Kubernetes has become a standard for orchestrating containers across on-premises, hybrid-cloud, and public cloud environments. But with this increased flexibility and scalability comes a new range of security challenges that require thoughtful, proactive solutions. In […]

Vuln Mgmt Image Recommendations
Product

Runtime Context for Smarter Patch Management: Upwind Simplifies Open Source Image Updates

Keeping open source container images up to date and secure is hard. Teams face long, noisy lists of available updates and often can’t tell which are relevant or risky. Upwind helps by showing what’s actually running in your environment and giving clear, context-based recommendations. The Open Source Security Challenge Most containerized environments rely heavily on […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.