
Upwind Named to Redpoint’s InfraRed 100 for the Second Year in a Row
We’re honored to share that Upwind has been named to Redpoint Ventures’ 2025 InfraRed 100, a list that recognizes the most promising private companies driving innovation in cloud infrastructure. This is our second year in a row receiving this recognition, and we’re incredibly humbled to be included alongside so many trailblazers in the space. The InfraRed 100 highlights […]

Upwind Partners with ZEST to Combine Runtime Protection with Real-World Remediation
Upwind is focused on a simple but powerful idea: security only matters when it can lead to action. Our platform delivers real-time, runtime intelligence – enriching posture findings with deep behavioral context, API and identity awareness, and actual exploitability signals. But even the most advanced detection loses value if remediation is slow, manual, or siloed. […]

Upwind + Jit: Bringing Runtime Context to AI-Powered Vulnerability Triage
Security teams are drowning in alerts. Static scanners surface thousands of issues, but most are irrelevant. The real challenge isn’t finding problems, it’s knowing which ones to fix. The Upwind + Jit integration brings runtime intelligence directly into AI-powered workflows so you can stop guessing and start fixing what matters. By combining Upwind’s real-time context […]

Bridging Runtime Risk and Code Ownership: Upwind + Cycode
As cloud environments grow more complex, runtime threats are increasingly tied to issues that originate far earlier in the software lifecycle. For example, a vulnerable open-source dependency introduced during development or misconfigured build pipelines that resulted in insecure container images. At Upwind, we believe runtime security is the foundation – but security doesn’t stop there. […]

What is Risk Posture Management?
As organizations scale across cloud, SaaS, AI, and hybrid infrastructure, tech leaders are being asked a deceptively simple question: “How much risk are we actually carrying right now — and how well are we managing it?” The problem is, most security programs still operate in silos. Companies track misconfigurations, vulnerabilities, or identity exposures independently without […]

Kubernetes Security Context
Kubernetes has revolutionized how organizations deploy and manage applications. It offered automated scheduling, self-healing, declarative configuration, horizontal scaling, and more. In fact, for the 96% of organizations using it, Kubernetes is indispensable. But everything’s not perfect; securing containerized workloads remains a significant challenge. As enterprises scale their Kubernetes environments, misconfigurations, excessive privileges, and runtime threats […]

AI Threat Detection
Artificial intelligence (AI) is everywhere, so it’s logical that machine learning models are being deployed to recognize patterns that indicate cyber threats — alerting organizations to anomalies that could indicate attacks in real time. Of course, AI can’t solve all cybersecurity problems, especially when adversaries employ it just as defenders do. And secondary challenges task […]

What is a Cloud Security Assessment? (And How Do We Do One?)
Cloud security assessments measure the effectiveness of existing security controls so teams get a complete picture of their gaps in misconfiguration detection, access management, and threat monitoring. These assessments should benchmark real-world attack paths — from privilege escalation to overly permissive IAM policies and lateral movement enabled by unsecured workloads. How do those issues stand […]

A New Era of Cloud Risk Detection: Custom Posture Rules & Frameworks in Upwind
Cloud environments continue to grow in complexity—and with them, the risk surface expands. CISOs and security leaders are now contending with an increasing volume of posture alerts, many of which fail to account for real-world exploitability. Traditional posture frameworks, while rooted in best practices, often fail to prioritize real risks. They evaluate risk by individual […]

EDR vs MDR: Choosing the Right Endpoint Security Solution
Endpoints are an issue. That doesn’t always mean they need a dedicated solution. And if they do, does that include management and security across layers? We’ve explored CDR as a standalone strategy and tool (today, it’s typically part of cloud-native application protection platforms, or CNAPP, solutions), and hacked out the differences between EDR and CDR. […]