Skip to main content
Robin Tatam, Perforce Puppet — Author profile headshot

Robin Tatam

Senior Technical Marketer and Evangelist

Latest Content from Robin Tatam

Blog

CMMC Requirements for 2025: How to Stay CMMC 2.0 Compliant & Prove Maturity at Any Level

Security & Compliance, Configuration Management
Blog

Our 2025 Cybersecurity & Compliance Predictions, from AI to Zero Trust

Prepare for the future of cybersecurity with 10 key security and compliance predictions for 2025, including AI-powered threats, evolving regulations, and the rise of quantum computing.
Security & Compliance
Blog

Configuration Management Tools: Examples, Use Cases & How to Choose the Right Configuration Management Tool

Learn how great configuration management tools can make a difference in the work that goes into your current infrastructure.
Configuration Management, Products & Services
Blog

Linux Security: Keeping Linux Machines Secure with Less Tinkering

Linux security uses a modular, open-source architecture to fine-tune security. But that can make it a challenge. Here are tips & best practices to secure Linux.
Security & Compliance, Ecosystems & Integrations
Blog

Avoid Non-Compliance Fines: Automate GDPR Controls

It's expensive when you don't comply with the General Data Protection Regulation (GDPR) controls — take for example the €310 million fine (equivalent to $335 million dollars) that LinkedIn received from the GDPR. In this case, they shared users’ personal data for targeted advertising and behavioural analyses, without asking for user consent. Can you afford €310 million? It might be time to automate GDPR controls for 24/7 compliance.
Security & Compliance
Blog

Understanding the NIST Framework and Recent AI Updates

Stay ahead of the NIST Framework and recent AI changes to protect your organization from cyber threats.
Government, Security & Compliance
Blog

MFA Configuration: How Automation Lets You Configure & Enforce MFA Compliance at Scale

Multi-factor authentication (MFA) configuration can be a huge challenge for enterprise IT. Learn how an MFA enforcement policy as code keeps it all consistent.
Security & Compliance, Infrastructure Automation
Blog

How to Achieve Zero Trust Adoption in U.S. Government

Zero trust adoption is critical, especially for U.S. government agencies. With changing policies and requirements, it can be tough to stay ahead of everything you need to know. We’ll provide a high-level overview of zero trust adoption + share how automation can help you achieve compliance.
Government, Security & Compliance
Blog

Meet FedRAMP Certification Requirements

FedRAMP certification is a must-have for cloud service providers (CSPs) working with the US government. Explore the steps to certification and learn how automation simplifies the process.
Security & Compliance, Products & Services