-
Trial Opens as Meta Investors Seek Billions Over Privacy Settlement
Meta board members face a rare trial as shareholders seek $8 billion in damages tied to Facebook’s 2019 privacy settlement with the FTC.
-
Say Hello to AWS Cost and Usage Reports Integration and Report in CloudQuery
CloudQuery announces its new AWS Cost and Usage Reports (CUR) integration—empowering engineering teams to analyze and optimize cloud spend directly from infrastructure data. Learn how to gain cost visibility, allocate budgets by tags or teams, and uncover hidden cloud expenses with powerful queries and dashboards.
-
How Hexagon built an Infrastructure Data Lake with CloudQuery
Discover how Hexagon, a global digital reality leader, built a serverless infrastructure data lake with CloudQuery, AWS S3, Glue, and Athena. Learn how they achieved centralized visibility, SQL querying, and historical insights across all cloud accounts, with virtually zero maintenance and significant cost savings.
-
AI for Analyzing Your Cloud Asset Inventory
Unlock your cloud asset inventory with AI! Discover CloudQuery's new Model Context Protocol (MCP) server, enabling any AI agent to directly query your infrastructure data using natural language. Learn how to empower security, FinOps, and infrastructure teams with real-time dashboards, tables, and reports, eliminating manual exports and boosting autonomous decision-making.
-
CloudQuery vs. Cloud Asset Inventory Tools
Drowning in multi-cloud complexity? Discover how CloudQuery leads the SQL-based asset inventory space, offering enterprise scalability and persistent storage. Compare it with Steampipe for real-time insights and native cloud tools for single-cloud simplicity, helping platform teams choose the right solution for comprehensive cloud visibility and compliance.
-
How to Make Your Internal Developer Portal Actually Useful
Is your Internal Developer Portal (IDP) a "documentation graveyard"? Discover how fresh, accurate asset inventory transforms IDPs into dynamic platforms, boosting developer productivity by 55%, slashing onboarding time by 67%, and delivering over 224% ROI by accelerating development and ensuring governance.
-
Visualize & Govern Your Cloud Stack with CloudQuery Reports
CloudQuery Reports delivers powerful, pre-built dashboards for security, compliance, operations, and cost across your multi-cloud stack—no deep cloud or SQL expertise needed. Get full visibility and control over your infrastructure in one place.
-
Fixing Kubernetes Asset Chaos: Why Most Enterprises Fail and How You Can Succeed
Is Kubernetes asset tracking a nightmare? Discover why 70% of enterprises struggle with multi-cloud visibility and governance, and learn how implementing a central configuration store pattern with SQL-native tools like CloudQuery can fix it, providing comprehensive, queryable insights for your entire K8s estate.
-
Beyond Hype: Akka.io's CEO on Solving Agentic AI's Toughest Challenges – Cost & Developer Experience
Explore Akka.io's architecture for scalable agentic AI. CEO Tyler Jewell shares real-world use cases, design patterns, and a bold vision for autonomy.
-
Scaling Kubernetes the Right Way: Platform Engineering Lessons from Kubermatic
Explore Kubernetes at scale with Kubermatic CEO Sebastian Scheele — platform engineering, AI integration, developer self-service, and open-source demo.
-
The state of observability in 2025: a deep dive on our third annual Observability Survey
Dive into Grafana Labs' third annual Observability Survey for 2025! Uncover how observability practices are maturing, why traces are gaining traction, the enduring power of open source, the emerging role of AI, and how cost continues to drive tool selection across organizations of all sizes.
-
Five Reasons Standalone Vulnerability Scanning Isn’t Enough in 2025
Vulnerability scanning alone doesn’t cut it anymore. While it’s long been a core security practice, scanning tools can’t tell you which vulnerabilities are exploitable, how attackers would target them, or which ones pose real risk. This article explores the limitations of vulnerability scanning, the shortfalls of traditional vulnerability management, and why organizations must adopt a risk-based, context-driven approach to application security. Learn how to prioritize based on exploitability, integrate security across the SDLC, and move toward continuous, intelligent threat detection.