Back to all posts
A cartoon penguin holding a pink padlock sits on a pink background. The word upwind appears in white text in the top right corner.

Linux Server Security

Linux servers form the backbone of nearly every enterprise infrastructure, from traditional data centers to cloud-native environments. But securing them isn’t as simple as hardening the OS or ticking off a compliance checklist. Especially in hybrid environments or scaling cloud workloads, Linux server security raises urgent questions: We’ve covered Linux hardening basics. Here, we’re going […]

Four green gear icons with plus signs surround a central circle containing a checkmark, connected by lines, on a light blue background. The word upwind appears in the top right corner.

What is AI-SPM?

As artificial intelligence (AI) adoption accelerates, from internal model development to widespread use of third-party AI technologies and generative tools, teams know their attack surfaces have spread. But that doesn’t mean they’re on board for tool subcategories like AI Security Posture Management (AI-SPM), let alone its compatriots like Cloud-SPM and Identity-SPM.  Yet, faced with the […]

A dark red, scalloped-edged badge with two star-shaped sparkles in the center is displayed on a pink gradient background. The word Upwind appears in white text in the top right corner, hinting at the intriguing question: What is Dark AI?.

What is Dark AI?

In what reads like the summary of an ever-escalating arms race, the CEO of NVIDIA recently predicted that, as artificial intelligence (AI) is increasingly able to produce fake information at high speeds, defenders will have to match that speed using their own AI tools. Is he correct? Are AI adversaries inevitable? Just what are the […]

A circular icon with a pink background displays three symbols: a padlock, code bracket, and gear—illustrating the best DevSecOps tools for security, coding, and settings. Upwind is elegantly inscribed in the top right corner.

Secure Your Private Cloud: Best Practices & Tools

Organizations often require greater security and control than public cloud providers can offer — especially when handling highly sensitive data or operating in heavily regulated industries. In such cases, private clouds provide an ideal solution, offering superior control, customization, and enhanced security by eliminating the shared infrastructure of public clouds. However, this increased level of […]

A stylized bitcoin symbol sits in the center of a sunburst design with a peach background, hinting at the mysterious world of digital currencies and posing the question, What is Cryptojacking? The symbol is surrounded by wavy, white lines. The word upwind is in the top right corner.

Understanding & Preventing Cryptojacking Attacks

Cryptojacking gained prominence in 2017 when browser-based mining made the exploitation of systems to produce cryptocurrency without the permission of users possible. Ever since, cloud-native environments have had to be on guard against this threat. But cryptojacking can be an overlooked threat. It’s not a risky unknown, like a Zero Day threat. And it’s often […]

A white cloud icon on a light purple background showcases two arrows, one pointing left and one right. Upwind is elegantly inscribed in the top right corner, subtly hinting at cloud migration security with its design.

Cloud Migration Security

Cloud migration security isn’t just about securing data in transit or ensuring compliance (those are foundational parts of a successful migration). It’s about mitigating deep, systemic risks that arise when shifting workloads from on-prem to cloud. That means that cloud migration security is not a one-time checklist but a strategic shift in visibility, control, and […]

Illustration of a partially charged battery icon with a red level indicator and a lightning bolt symbol against a soft pink background. The word Upwind appears in the top right corner, subtly hinting at the energy flow akin to discussing, What is Container Runtime Interface?.

Understanding the Container Runtime Interface (CRI) in Kubernetes

Apps and their dependencies don’t run on their own — they need container runtimes to help power their execution by providing the right environment, resource management, and lifecycle operations for containers. While we’ve covered container runtimes and container runtime security, we haven’t looked at a foundational component of containers themselves — the Container Runtime Interface […]

A black padlock icon featuring a cloud symbol sits against a purple backdrop, subtly hinting at the question, What is Cloud Workload Security? The word upwind appears in crisp white text in the top right corner.

What is Cloud Workload Security?

There are a variety of approaches to workload security, ranging from zero-trust to network segmentation, agents or agentless – and more. Cloud workloads need securing, but the details of how to achieve a secure environment best, without standing in the way of agile development, make the roadmap to workload security less than direct.  We’re breaking […]

The AWS logo is encircled by sleek, stylized orange container shapes on a beige background, subtly hinting at the question, "What Are AWS Containers?" The word "upwind" graces the top right corner.

Secure & Efficient Container Orchestration on AWS

Running containers on Amazon Web Services (AWS) offers flexibility and scalability for modern application architectures, but it also introduces unique security, management, and compliance challenges. We’ve already discussed unique aspects of AWS container security. In this article, we take a broader view of the unique features of AWS containers that you need to know about […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.