Skip to main content
Robin Tatam, Perforce Puppet — Author profile headshot

Robin Tatam

Senior Technical Marketer and Evangelist

Latest Content from Robin Tatam

MFA Configuration: How Automation Lets You Configure & Enforce MFA Compliance at Scale Blog

MFA Configuration: How Automation Lets You Configure & Enforce MFA Compliance at Scale

Multi-factor authentication (MFA) configuration can be a huge challenge for enterprise IT. Learn how an MFA enforcement policy as code keeps it all consistent.
Security & Compliance, Infrastructure Automation
How to Achieve Zero Trust Adoption in U.S. Government Blog

How to Achieve Zero Trust Adoption in U.S. Government

Zero trust adoption is critical, especially for U.S. government agencies. With changing policies and requirements, it can be tough to stay ahead of everything you need to know. We’ll provide a high-level overview of zero trust adoption + share how automation can help you achieve compliance.
Government, Security & Compliance
Meet FedRAMP Certification Requirements Blog

Meet FedRAMP Certification Requirements

FedRAMP certification is a must-have for cloud service providers (CSPs) working with the US government. Explore the steps to certification and learn how automation simplifies the process.
Security & Compliance, Products & Services
Why Move from Open Source Puppet to Puppet Enterprise? Here are 10 Reasons Blog

Why Move from Open Source Puppet to Puppet Enterprise? Here are 10 Reasons

Considering moving from Open Source Puppet to Puppet Enterprise? In this article, we'll cover typical use cases for the enterprise version of Puppet, why businesses that moved from Puppet's open source version to Puppet Enterprise made the switch, and how customers drive time to value with Puppet Enterprise faster than Open Source Puppet.
How to & Use Cases, Products & Services
XZ Utils, the xz Backdoor & What We Can Learn from Open Source CVEs Blog

XZ Utils, the xz Backdoor & What We Can Learn from Open Source CVEs

The xz backdoor was a vulnerability in XZ Utils, a popular data compression library. The xz backdoor could let unauthorized users gain admin-level access to systems, endangering data security and much more. Read on to learn more about the xz backdoor, where it came from, and how to minimize the impact of software vulnerabilities in your systems.
Security & Compliance, How to & Use Cases
Stay Ahead of Known Vulnerabilities with Automated Patch Management Blog

Stay Ahead of Known Vulnerabilities with Automated Patch Management

The consequences of not patching are everywhere: remember the Log4j vulnerability that grants hackers complete access to your devices? The best way to prevent this from happening is to use a patched version of Log4j — so why did this become a catastrophic and prolific security vulnerability event?
Security & Compliance
The Secret to Enterprise Observability: Agent-Based Automation & Configuration Management Blog

The Secret to Enterprise Observability: Agent-Based Automation & Configuration Management

Observability provides crucial insights to an IT system & its components. Agent-based automation makes sure observability tools don't run into scaling problems.
Configuration Management, Infrastructure Automation
Why You Need Continuous Compliance and Risk Management Blog

Why You Need Continuous Compliance and Risk Management

Keep hackers at bay and pass your next audit without hassle — here’s why you need continuous compliance and risk management.
Ecosystems & Integrations, DevOps
CIS Benchmarks Explained: Levels & Steps for Quick CIS Benchmark Compliance Blog

CIS Benchmarks Explained: Levels & Steps for Quick CIS Benchmark Compliance

CIS Benchmarks are important for security and compliance. In this blog, you'll get an overview, plus learn how to enforce CIS Benchmarks with Puppet.
Security & Compliance, How to & Use Cases