Back to all posts
infrared-100-2025
Company News

Upwind Named to Redpoint’s InfraRed 100 for the Second Year in a Row

We’re honored to share that Upwind has been named to Redpoint Ventures’ 2025 InfraRed 100, a list that recognizes the most promising private companies driving innovation in cloud infrastructure. This is our second year in a row receiving this recognition, and we’re incredibly humbled to be included alongside so many trailblazers in the space. The InfraRed 100 highlights […]

Upwind and Zest logos side by side on a pastel gradient background with angled lines.
Product

Upwind Partners with ZEST to Combine Runtime Protection with Real-World Remediation

Upwind is focused on a simple but powerful idea: security only matters when it can lead to action. Our platform delivers real-time, runtime intelligence – enriching posture findings with deep behavioral context, API and identity awareness, and actual exploitability signals. But even the most advanced detection loses value if remediation is slow, manual, or siloed. […]

Logo image with the word Upwind in black next to the word Jit in pink, separated by a vertical line, on a white background with purple and pink geometric accents.
Product

Upwind + Jit: Bringing Runtime Context to AI-Powered Vulnerability Triage

Security teams are drowning in alerts. Static scanners surface thousands of issues, but most are irrelevant. The real challenge isn’t finding problems, it’s knowing which ones to fix. The Upwind + Jit integration brings runtime intelligence directly into AI-powered workflows so you can stop guessing and start fixing what matters. By combining Upwind’s real-time context […]

Upwind and Cycode logos side by side on a light blue and white geometric background with vertical stripes and gradients.
Product

Bridging Runtime Risk and Code Ownership: Upwind + Cycode

As cloud environments grow more complex, runtime threats are increasingly tied to issues that originate far earlier in the software lifecycle. For example, a vulnerable open-source dependency introduced during development or misconfigured build pipelines that resulted in insecure container images. At Upwind, we believe runtime security is the foundation –  but security doesn’t stop there. […]

An illustration of a smiling sandcastle with two small towers on a circular sandy area, set against a pink background. The word Upwind appears in the top right corner.

What is Risk Posture Management?

As organizations scale across cloud, SaaS, AI, and hybrid infrastructure, tech leaders are being asked a deceptively simple question: “How much risk are we actually carrying right now — and how well are we managing it?” The problem is, most security programs still operate in silos. Companies track misconfigurations, vulnerabilities, or identity exposures independently without […]

Diagram showing five interconnected rectangles, each with blue sections, surrounding a central Kubernetes logo on a light purple background. The “upwind” logo appears in the top right corner.

Kubernetes Security Context

Kubernetes has revolutionized how organizations deploy and manage applications. It offered automated scheduling, self-healing, declarative configuration, horizontal scaling, and more. In fact, for the 96% of organizations using it, Kubernetes is indispensable. But everything’s not perfect; securing containerized workloads remains a significant challenge. As enterprises scale their Kubernetes environments, misconfigurations, excessive privileges, and runtime threats […]

A white starburst icon with two sparkles is centered on a pink gradient background, evoking innovation in AI Threat Detection. The word Upwind appears in white text at the top right corner.

AI Threat Detection

Artificial intelligence (AI) is everywhere, so it’s logical that machine learning models are being deployed to recognize patterns that indicate cyber threats — alerting organizations to anomalies that could indicate attacks in real time. Of course, AI can’t solve all cybersecurity problems, especially when adversaries employ it just as defenders do. And secondary challenges task […]

Three stylized figures with padlock symbols float on separate platforms against a pink background, representing Cloud Security Assessment. The Upwind logo appears in the top right corner.

What is a Cloud Security Assessment? (And How Do We Do One?)

Cloud security assessments measure the effectiveness of existing security controls so teams get a complete picture of their gaps in misconfiguration detection, access management, and threat monitoring. These assessments should benchmark real-world attack paths — from privilege escalation to overly permissive IAM policies and lateral movement enabled by unsecured workloads. How do those issues stand […]

A user interface for creating a rule in Upwind, showing options to select a framework, rule category, rule name, and override severity level. Buttons for Cancel and Save appear at the bottom.
Product

A New Era of Cloud Risk Detection: Custom Posture Rules & Frameworks in Upwind

Cloud environments continue to grow in complexity—and with them, the risk surface expands. CISOs and security leaders are now contending with an increasing volume of posture alerts, many of which fail to account for real-world exploitability. Traditional posture frameworks, while rooted in best practices, often fail to prioritize real risks. They evaluate risk by individual […]

Illustration of a stylized lighthouse with red and beige stripes, standing on a wavy blue base, set against a light blue background. The word upwind appears in the top right corner, symbolizing the strategic direction-taking akin to EDR vs MDR decisions.

EDR vs MDR: Choosing the Right Endpoint Security Solution

Endpoints are an issue. That doesn’t always mean they need a dedicated solution. And if they do, does that include management and security across layers? We’ve explored CDR as a standalone strategy and tool (today, it’s typically part of cloud-native application protection platforms, or CNAPP, solutions), and hacked out the differences between EDR and CDR. […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.