Get a Demo
Back to all posts
exploitable-functions
Product

The Revolution in Cloud Security Prioritization

In the modern cloud landscape, security teams are drowning in a deluge of vulnerabilities. Thousands of Common Vulnerabilities and Exposures (CVEs) lurk within base images, open-source libraries, and operating systems. While today’s security infrastructure is doing better at detection—scanning images, generating Software Bills of Materials (SBOMs), and identifying exposures at scale—the real battle has shifted. […]

Upwind+Microsoft_Partnership_16x9_01 (1)
Company News, News

Upwind and Microsoft Partner to Bring Security at runtime speed to Azure

Cloud Security has changed Teams are moving faster, architectures are getting more dynamic, and the old way of securing cloud environments with disconnected tools and static findings is no longer enough. Security leaders need more than posture snapshots. They need real-time context, runtime intelligence, and the ability to focus on what is actually exploitable. That […]

New Frameworks - Compliance
Product

Expanding Compliance Coverage with New Industry Frameworks and Upwind’s Cloud Hygiene Framework

Cloud security teams are being asked to do more than ever. They need to prove compliance against growing regulatory demands, reduce configuration risk, and keep cloud environments lean, secure, and aligned with how they were actually designed to operate. That is why we are excited to introduce several new frameworks now available in Upwind’s Configurations […]

Upwind-Audit-Logs
Product

Upwind Audit Logs: Complete Traceability for Every Action in the Platform

When something changes in your cloud security platform, the first question is almost always the same: What happened and who did it? Upwind Audit Logs gives security and platform teams a centralized, searchable record of user-driven actions across the Upwind platform, including activity performed through the UI or Public API. The result is clearer accountability, […]

Azure Container Service Tracer
Product

Upwind Runtime Protection Now Supports Azure

Cloud teams are moving fast on Azure PaaS to reduce operational overhead—serverless containers with Azure Container Apps and managed web apps with Azure App Services. But that speed often comes with a tradeoff: security visibility and detection can lag behind because you don’t have the same host access or deployment patterns you’d expect in Kubernetes […]

custom dashboards
Product

Upwind Custom Dashboards

Personalize your view—without compromising RBAC, ownership, or auditability. We’re excited to share that Custom Dashboards are now available to all customers. This is an important step in Upwind’s Enterprise readiness, giving teams the ability to tailor how they consume insights based on role, responsibility, and priority—turning existing widgets into personalized, actionable dashboards. Overview Upwind’s Custom […]

image layers hero
Product

Image Layers are now in the Upwind Console

Upwind’s Image Layers capability gives you deep visibility into how container images are built—so you can assign vulnerability ownership correctly, find root cause faster, and remediate issues more effectively across teams. Most tools only show the final image state. Upwind breaks images down layer by layer, so you can see exactly where a vulnerability was […]

k8s admission controller
Product

Stop Misconfigurations Before They Ship with Upwind Kubernetes Admission Controller

Kubernetes environments move fast. Deployments happen constantly—through CI/CD pipelines, GitOps workflows, and direct kubectl commands. And when a misconfiguration slips in (a privileged pod, a missing required label, a deprecated API version), it can become a security incident in minutes. Until now, most teams have relied on post-deployment scanning to catch these issues. The problem: […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.