Skip to main content
Skip to footer
Upwind raises $250M Series B to secure the cloud for the world →
Platform
Platform
Upwind CNAPP
One platform to secure all your cloud infrastructure & applications.
Build
Secure by Design
Run
Cloud Runtime Visibility
Protect
Application Runtime Defense
Solutions
Solutions
Build
IaC Security
Supply Chain Security (SCA & SBOM)
Containers Admission Controller
Run
Cloud Security Posture Management (CSPM)
Attack Path Analysis & Exposure Management
Cloud Infrastructure Entitlements Management (CIEM)
Vulnerability Management
Data Security Posture Management (DSPM)
Container & Kubernetes Security
AI Security Posture Management (AI-SPM)
Serverless Security
AI Security
Protect
Cloud Detection & Response (CDR)
Attack Surface Management
API Security
Dynamic Application Security Testing (DAST)
Incident Response (MDR)
Resources
Resources
Feed
Articles, research and news from Upwind
Events
Meet us in-person or online
UpwindTV
Watch the latest content
Glossary
Expand your security knowledge
Integrations
Integrate Upwind with your extended cloud ecosystem.
Customers
Partners
Partners
Our Partners
Explore Upwind’s tech and strategic partnerships
Amazon Web Services
Partner with Upwind to secure cloud workloads and services like Bedrock
Microsoft Azure
Partner with Upwind to secure cloud workloads and services like Azure AI
Technology Alliances
Integrate Upwind with your extended cloud ecosystem
Google Cloud
Partner with Upwind to secure cloud workloads and services like Gemini
Oracle Cloud
Partner with Upwind to secure cloud workloads and services across OCI
Channel Partners
Deliver stronger security outcomes for customers with Upwind
Company
Company
About
Upwind’s story and team
Careers
Join the future of cloud security
Newsroom
Latest News and Information about Upwind
Love From Across the Community
Hear from our supporters
Get a Demo
Back to Glossary
Currently Browsing:
Code Security
Search Glossary
By Category
AI Security
Best Practices
CloudSec
Code Security
Compliance
Containers/K8s
Detection and Response
Threat Landscape
Tools
SAST Fundamentals for Securing Source Code
Moran Stahi
Learn More
What is the Linux Kernel?
Bar Klinghofer
Learn More
Best Open-Source DevSecOps Tools in 2025
Joshua Burgin
Learn More
Understanding the Shared Responsibility Model in Cloud Security
Jonathan Cohen
Learn More
CIEM vs. CSPM: A Comprehensive Comparison
Daniel Shaoul
Learn More
Understand eBPF Security: Deep Visibility & Real-Time Threat
Daniel Shaoul
Learn More
Understand Runtime Application Self-Protection (RASP)
Denise Ashur
Learn More
Choosing the Right SBOM Format for Your Security Team
Bar Klinghofer
Learn More