Skip to main content
Robin Tatam, Perforce Puppet — Author profile headshot

Robin Tatam

Senior Technical Marketer and Evangelist

Latest Content from Robin Tatam

Jekyll and Hyde: Taming AI Security with Automation Blog

Jekyll and Hyde: Taming AI Security with Automation

AI for security offers both benefits and challenges. Explore how to enhance threat detection and more with automation — combating the threat of AI with AI.
Security & Compliance
Automating DORA Compliance Requirements with Policy as Code Blog

Automating DORA Compliance Requirements with Policy as Code

Simplify DORA compliance: learn how to leverage policy as code to automate DORA requirements, minimise risk, and free your team from manual tasks.
Security & Compliance
Cloud Repatriation: Examples, 2025 Trends & Tips for Reverse Migration Blog

Cloud Repatriation: Examples, 2025 Trends & Tips for Reverse Migration

If you moved to the cloud only to find it's not all it’s cracked up to be, cloud repatriation might be a great next step. This blog covers what to consider and questions to ask when planning a move from public cloud infrastructure to private cloud, on-premises, or hybrid deployment.
Cloud, Infrastructure Automation
CMMC Requirements for 2025: How to Stay CMMC 2.0 Compliant & Prove Maturity at Any Level Blog

CMMC Requirements for 2025: How to Stay CMMC 2.0 Compliant & Prove Maturity at Any Level

Security & Compliance, Configuration Management
Our 2025 Cybersecurity & Compliance Predictions, from AI to Zero Trust Blog

Our 2025 Cybersecurity & Compliance Predictions, from AI to Zero Trust

Prepare for the future of cybersecurity with 10 key security and compliance predictions for 2025, including AI-powered threats, evolving regulations, and the rise of quantum computing.
Security & Compliance
Configuration Management Tools: Examples, Use Cases & How to Choose the Right Configuration Management Tool Blog

Configuration Management Tools: Examples, Use Cases & How to Choose the Right Configuration Management Tool

Learn how great configuration management tools can make a difference in the work that goes into your current infrastructure.
Configuration Management, Products & Services
Linux Security: Keeping Linux Machines Secure with Less Tinkering Blog

Linux Security: Keeping Linux Machines Secure with Less Tinkering

Linux security uses a modular, open-source architecture to fine-tune security. But that can make it a challenge. Here are tips & best practices to secure Linux.
Security & Compliance, Ecosystems & Integrations
Avoid Non-Compliance Fines: Automate GDPR Controls Blog

Avoid Non-Compliance Fines: Automate GDPR Controls

It's expensive when you don't comply with the General Data Protection Regulation (GDPR) controls — take for example the €310 million fine (equivalent to $335 million dollars) that LinkedIn received from the GDPR. In this case, they shared users’ personal data for targeted advertising and behavioural analyses, without asking for user consent. Can you afford €310 million? It might be time to automate GDPR controls for 24/7 compliance.
Security & Compliance
Understanding the NIST Framework and Recent AI Updates Blog

Understanding the NIST Framework and Recent AI Updates

Stay ahead of the NIST Framework and recent AI changes to protect your organization from cyber threats.
Government, Security & Compliance