Skip to main content
Robin Tatam, Perforce Puppet — Author profile headshot

Robin Tatam

Senior Technical Marketer and Evangelist

Latest Content from Robin Tatam

Configuration Management Tools: Examples, Use Cases & How to Choose the Right Configuration Management Tool Blog

Configuration Management Tools: Examples, Use Cases & How to Choose the Right Configuration Management Tool

Learn how great configuration management tools can make a difference in the work that goes into your current infrastructure.
Configuration Management, Products & Services
Linux Security: Keeping Linux Machines Secure with Less Tinkering Blog

Linux Security: Keeping Linux Machines Secure with Less Tinkering

Linux security uses a modular, open-source architecture to fine-tune security. But that can make it a challenge. Here are tips & best practices to secure Linux.
Security & Compliance, Ecosystems & Integrations
Avoid Non-Compliance Fines: Automate GDPR Controls Blog

Avoid Non-Compliance Fines: Automate GDPR Controls

It's expensive when you don't comply with the General Data Protection Regulation (GDPR) controls — take for example the €310 million fine (equivalent to $335 million dollars) that LinkedIn received from the GDPR. In this case, they shared users’ personal data for targeted advertising and behavioural analyses, without asking for user consent. Can you afford €310 million? It might be time to automate GDPR controls for 24/7 compliance.
Security & Compliance
Understanding the NIST Framework and Recent AI Updates Blog

Understanding the NIST Framework and Recent AI Updates

Stay ahead of the NIST Framework and recent AI changes to protect your organization from cyber threats.
Government, Security & Compliance
MFA Configuration: How Automation Lets You Configure & Enforce MFA Compliance at Scale Blog

MFA Configuration: How Automation Lets You Configure & Enforce MFA Compliance at Scale

Multi-factor authentication (MFA) configuration can be a huge challenge for enterprise IT. Learn how an MFA enforcement policy as code keeps it all consistent.
Security & Compliance, Infrastructure Automation
How to Achieve Zero Trust Adoption in U.S. Government Blog

How to Achieve Zero Trust Adoption in U.S. Government

Zero trust adoption is critical, especially for U.S. government agencies. With changing policies and requirements, it can be tough to stay ahead of everything you need to know. We’ll provide a high-level overview of zero trust adoption + share how automation can help you achieve compliance.
Government, Security & Compliance
Meet FedRAMP Certification Requirements Blog

Meet FedRAMP Certification Requirements

FedRAMP certification is a must-have for cloud service providers (CSPs) working with the US government. Explore the steps to certification and learn how automation simplifies the process.
Security & Compliance, Products & Services
Why Move from Open Source Puppet to Puppet Enterprise? Here are 10 Reasons Blog

Why Move from Open Source Puppet to Puppet Enterprise? Here are 10 Reasons

Considering moving from Open Source Puppet to Puppet Enterprise? In this article, we'll cover typical use cases for the enterprise version of Puppet, why businesses that moved from Puppet's open source version to Puppet Enterprise made the switch, and how customers drive time to value with Puppet Enterprise faster than Open Source Puppet.
How to & Use Cases, Products & Services
XZ Utils, the xz Backdoor & What We Can Learn from Open Source CVEs Blog

XZ Utils, the xz Backdoor & What We Can Learn from Open Source CVEs

The xz backdoor was a vulnerability in XZ Utils, a popular data compression library. The xz backdoor could let unauthorized users gain admin-level access to systems, endangering data security and much more. Read on to learn more about the xz backdoor, where it came from, and how to minimize the impact of software vulnerabilities in your systems.
Security & Compliance, How to & Use Cases