Skip to main content
Robin Tatam, Perforce Puppet — Author profile headshot

Robin Tatam

Senior Technical Marketer and Evangelist

Latest Content from Robin Tatam

Blog

How Automation Can Support Threat Vulnerability Management + Reduce the Attack Surface

Threat vulnerability management across your entire attack surface has higher stakes than ever before — here’s where automation can help.
Security & Compliance
Blog

Sarbanes-Oxley (SOX) Compliance: How SecOps Can Stay Ready + Pass Your Next SOX Audit

With high scrutiny and heavy penalties for failing a SOX audit, SOX compliance is a must for publicly traded US companies. Read our blog for the highlights, how IT helps pass a SOX audit + how to stay compliant year-round.
Security & Compliance
Blog

Security Automation Tools: SIEM, SOAR, IAM, Configuration Management + More Tools to Ensure IT Security

Security automation tools can make your IT strategy fireproof by taking manual work out of your team’s hands. In this blog, we’ll explain how out how security automation tools can handle some of the biggest day-to-day challenges for enterprises, like security and compliance.
Security & Compliance, Infrastructure Automation
Blog

DoD Compliance + DoD Configuration Management: How to Get Compliant with Less Effort

Learn how federal IT teams can automate DoD continuous compliance without the delay, risk, and cost of manual approaches.
Security & Compliance, Government
Blog

Managing Compliance: Tips + Strategies for Breaking the Vicious Scan-Fix-Drift Cycle

Managing compliance in IT means defining and enforcing a desired state configuration in your IT systems. Read this blog to get an idea of managing compliance tasks and how to break the scan-fix-drift cycle.
Security & Compliance, Infrastructure Automation
Blog

Government Risk Management: How Agencies Balance the Risks vs. Benefits of Digital Transformation

Government risk management is an agency’s plan for responding to dangers to the well-being of citizens. In this blog, learn how agencies can modernize IT + mitigate risk.
Government, Security & Compliance
Blog

What the 2023 National Cybersecurity Strategy Means for Your IT

To help you understand the U.S.’s new national cyber strategy, this post will dive into the highlights, who needs to worry about it, and what the 2023 National Cybersecurity Strategy means for your IT and infrastructure.
Security & Compliance
Blog

What is Configuration Management? Understanding the Configuration Management Process with Examples, Tools & Use Cases

Configuration management helps organizations remain in a desired state without needing to manually track every change. Learn more about what configuration management is and how it works.
Glossary, Configuration Management