Robin Tatam
Senior Technical Marketer and Evangelist
Robin Tatam (CISM CPFA CTSP CTMA PCI-P) is a Senior Technical Marketer and Evangelist at Puppet by Perforce, where he promotes the benefits of managing compliance using Puppet. He has has contributed thought leadership and advocacy to a range of DevOps focus areas, including regulatory compliance and proactive IT security practices.
Prior to his role with Puppet, Robin worked as a Security Evangelist, and was a globally recognized SME and five-time IBM Champion. Robin also loves travel and cultural exploration, is an accomplished photographer, and considers himself an amateur mixologist.
Latest Content from Robin Tatam
Blog MFA Configuration: How Automation Lets You Configure & Enforce MFA Compliance at Scale
Multi-factor authentication (MFA) configuration can be a huge challenge for enterprise IT. Learn how an MFA enforcement policy as code keeps it all consistent.
Security & Compliance, Infrastructure Automation
Blog How to Achieve Zero Trust Adoption in U.S. Government
Zero trust adoption is critical, especially for U.S. government agencies. With changing policies and requirements, it can be tough to stay ahead of everything you need to know. We’ll provide a high-level overview of zero trust adoption + share how automation can help you achieve compliance.
Government, Security & Compliance
Blog Why Move from Open Source Puppet to Puppet Enterprise? Here are 10 Reasons
Considering moving from Open Source Puppet to Puppet Enterprise? In this article, we'll cover typical use cases for the enterprise version of Puppet, why businesses that moved from Puppet's open source version to Puppet Enterprise made the switch, and how customers drive time to value with Puppet Enterprise faster than Open Source Puppet.
How to & Use Cases, Products & Services
Blog XZ Utils, the xz Backdoor & What We Can Learn from Open Source CVEs
The xz backdoor was a vulnerability in XZ Utils, a popular data compression library. The xz backdoor could let unauthorized users gain admin-level access to systems, endangering data security and much more.
Read on to learn more about the xz backdoor, where it came from, and how to minimize the impact of software vulnerabilities in your systems.
Security & Compliance, How to & Use Cases
Blog Stay Ahead of Known Vulnerabilities with Automated Patch Management
The consequences of not patching are everywhere: remember the Log4j vulnerability that grants hackers complete access to your devices? The best way to prevent this from happening is to use a patched version of Log4j — so why did this become a catastrophic and prolific security vulnerability event?
Security & Compliance
Blog The Secret to Enterprise Observability: Agent-Based Automation & Configuration Management
Observability provides crucial insights to an IT system & its components. Agent-based automation makes sure observability tools don't run into scaling problems.
Configuration Management, Infrastructure Automation