Back to all posts
G-145 CI:CD Pipeline Security Explained

CI/CD Pipeline Security Explained

The Continuous Integration/Continuous Delivery or Deployment (CI/CD) pipeline integrates and tests code changes, often multiple times per day. And it automatically prepares code for release, sometimes automatically pushing code changes all the way to production without manual intervention. Practicing CI/CD today means faster delivery, more updates, and happier customers, all with fewer errors.  But it […]

G-138 What Is Unified Security Posture Management (USPM)?

What Is Unified Security Posture Management (USPM)?

Security posture isn’t all about misconfigurations, but can span thousands of combined moving parts across cloud workloads, identities, and SaaS applications, APIs, endpoints, and even AI pipelines.  The problem?  Everyone sees a slice of the total environment, but no one sees the whole. Most organizations plug visibility holes in their environments first with fragmented tools […]

G_135_Understanding_Breakout_Time_The_Critical_Race_in_the_Cloud

Understanding Breakout Time: The Critical Race in the Cloud

Attackers access cloud systems through vulnerabilities like misconfigured Identity and Access Management (IAM) roles, public buckets, or exposed secrets. But they don’t stay in those initial entryways for long. The time it takes cyberattackers to “breakout” of their initial locations and move laterally across a cloud system is called “breakout time.” And it shapes cyberdefense […]

G-123 What is Identity Threat Detection and Response (ITDR)?

What is Identity Threat Detection and Response (ITDR)?

First, there were perimeters. The idea gradually gave way to endpoints, but today, identities are often the first point of entry to vast, diverse cloud systems. They’re enablers of lateral movement, pivot points in cloud and SaaS environments, that hold the keys to the rest of the environment. In other words, identities deserve attention. In […]

1st_place_cnapp_showdown_-_overall_winner-2025-2048x1229
Company News

Upwind Wins Big at Cloud Security Showdown Hosted by Tamnoon & Analyst James Berthoty

Big win for Upwind: We took home the overall title and earned top honors across every category at the Tamnoon Cloud Security Demo Showdown on June 5th. Upwind placed in the top three for all four categories of the people’s choice categories: Application Security, Cloud Security Posture Management (CSPM), Runtime Security, and Vulnerability Management. These […]

Configuration Reporting
Product

Upwind Simplifies Compliance with Real-Time Configuration Reporting

We are excited to announce a new enhancement to Upwind’s posture capabilities, with Upwind now providing comprehensive executive-level Configuration Reports. Users can now generate and download configuration reports, powered by live runtime data, directly from the UI. These reports deliver clear, actionable summaries of posture risk and misconfiguration findings, making it easier for security leaders […]

A stylized illustration of a pen lying horizontally across an oval shape with blue and tan sections, on a light beige background. The upwind logo appears in the top right corner.

What Is API Discovery?

It’s not about how application programming interfaces (APIs) work. It’s not even about API security. It’s about what shadow or orphaned APIs are live right now — and how your teams can tell. As API use has grown substantially over the past few years, it’s become too easy to lose sight of how many APIs […]

Illustration of binoculars with padlock icons in each lens on a pink background; the word upwind is in the top right corner.

Agent vs Agentless Security

In 2024, Crowdstrike’s faulty agent update drew attention to the risks associated with deploying and updating agents across enterprise environments. But agent-based systems producing valuable alerts correctly can also fail when those alerts are deprioritized by teams who don’t act on them in time (like the 2013 Target breach). And agentless systems come with their […]

Illustration of binoculars with each lens showing an image of the Earth, set against a light blue background. The word upwind and the phrase XDR vs SOAR appear in the top right corner.

XDR vs SOAR

Evaluating Extended Detection and Response (XDR) and Security Orchestration, Automation, and Response (SOAR) solutions means wrestling with integration, scalability, detection capabilities, automation — and the overall long-term viability of relying on one, or both, solutions within the current ecosystem. After all, adding tools is no one’s goal. Teams don’t need tools for their own sake; […]

Inventory 2-0-c
Product

Upwind Inventory 2.0: Discover, Query, and Enforce with Runtime Context

Today, we’re introducing one of the most important upgrades we’ve ever made to the Upwind platform – designed to solve a persistent problem for security teams: connecting inventory data with real-time enforcement and meaningful policy impact. This release brings a new level of enhanced inventory management that redefines how security teams discover, query, and enforce […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.