Operations | Monitoring | ITSM | DevOps | Cloud

Securing Your Business's Future with Cloud Services

We're taking a look at how you can secure your business's future with cloud services and how security threats can seriously impact your business. Security concerns for cloud-based services often start small, with a missed update, a misconfigured setting, or an overlooked access point. But in practice, those small gaps can open into much wider vulnerabilities, affecting not just data but the ability to operate.

Compliance Requirements for Financial Services

We're taking a look at how you can secure your business's future with cloud services and how security threats can seriously impact your business. Moving to the cloud has changed the way organisations handle infrastructure, but for highly regulated sectors like finance, it’s never been a straightforward leap. It comes with serious scrutiny, and a long list of requirements to meet before any workloads can safely be moved off-prem.

The Impending SaaS Crisis: How AI Is Disrupting SaaS - And How You Can Prepare

At CloudZero’s most recent company retreat, we held an investor panel, where representatives from four of the VC firms investing in CloudZero fielded questions from our team. Unsurprisingly, a good deal of the conversation revolved around AI. A standout moment from this panel came when one investor described a vibe coding session he’d done about a month prior. “Vibe coding,” for the uninitiated, means using AI to build an application without writing any actual code yourself.

Size-capped telemetry storage with ClickHouse and Coroot

Cloud platforms make it incredibly easy to store data. Object storage feels endless, and block volumes can be resized anytime. That’s great, until you check the cost. In some cases, like financial transactions, storage costs are tiny compared to the value of the data. But observability is a different story. Logs, traces, and profiles can be extremely detailed and often take up more space than the actual business data. Yes, there are situations where logs need to be kept for compliance reasons.

Boosting Session Replay performance on iOS with View Renderer V2

After making Session Replay GA for Mobile, the adoption rose quickly and more feedback reached us. In less great news, our Apple SDK users reported that the performance overhead of Session Replay on older iOS devices made their apps unusable. So we went on the journey to find the culprit and found a solution that yielded 4-5x better performance in our benchmarks.

Balancing Speed and Safety with Continuous Delivery

The benefits of continuous delivery are well known these days: rapid feedback, speed of innovation, reduced fault recovery time, and increased confidence in release processes. Along the same lines, those who release less frequently are likely to encounter more stress. Continuous delivery is a spectrum; it doesn’t have to mean blasting every commit to all production environments at once. So, how do we strike a balance between speed and safety?

What craft means for Canonical

Last month Jon Seager (our Vice President for Ubuntu Engineering) wrote about crafting software: Multiple Canonical products have craft in their names: Snapcraft, Charmcraft, Rockcraft (and there are others in the works). Our craft products are tools for making software, for the software craftsperson. To be a maker of tools comes with responsibilities – when you decide what tools should be like, you are also deciding how people should work.

Weaponized AI vs. AI Driven Security Posture Management: Why the Battle Starts in Misconfigurations

August 5, 2025, Las Vegas Black Hat 2025, Abnormal AI officially launched its Security Posture Management for Microsoft 365. This release marks a critical turning point. In an era where attackers weaponized AI to uncover and exploit misconfigured cloud environments at machine speed, reactive security simply can’t keep pace. Threat actors are now leveraging automated AI to scan systems, identify configuration drift, escalate privileges, and deploy zero‑day exploits in seconds.

Automating Network Diagrams for A Complete View of All Active and Passive Components

Accurately tracking how data center devices are connected—across switches, patch panels, structured cabling, and more—is essential for efficient data center operations. But for many teams, documentation still lives in static diagrams or outdated spreadsheets, requiring extensive manual effort. This is time-consuming and leads to inaccuracies that can cause delays in planning or troubleshooting and unnecessary risk. Sunbird DCIM changes that.

3 Signs You've Outgrown Scripts and Spreadsheets for Network Configs

In the early days of any IT operation, pragmatism rules. Most network teams start with what’s readily available—custom scripts, Excel spreadsheets, shared network drives, and tribal knowledge. It’s cost-effective and familiar. But as your organization grows, so does the complexity of your network. Devices multiply, configurations diversify, and the operational risk of keeping everything “stitched together” with manual methods increases exponentially.