Skip to main content
Robin Tatam, Perforce Puppet — Author profile headshot

Robin Tatam

Senior Technical Marketer and Evangelist

Latest Content from Robin Tatam

Stay Ahead of Known Vulnerabilities with Automated Patch Management Blog

Stay Ahead of Known Vulnerabilities with Automated Patch Management

The consequences of not patching are everywhere: remember the Log4j vulnerability that grants hackers complete access to your devices? The best way to prevent this from happening is to use a patched version of Log4j — so why did this become a catastrophic and prolific security vulnerability event?
Security & Compliance
The Secret to Enterprise Observability: Agent-Based Automation & Configuration Management Blog

The Secret to Enterprise Observability: Agent-Based Automation & Configuration Management

Observability provides crucial insights to an IT system & its components. Agent-based automation makes sure observability tools don't run into scaling problems.
Configuration Management, Infrastructure Automation
Why You Need Continuous Compliance and Risk Management Blog

Why You Need Continuous Compliance and Risk Management

Keep hackers at bay and pass your next audit without hassle — here’s why you need continuous compliance and risk management.
Ecosystems & Integrations, DevOps
CIS Benchmarks Explained: Levels & Steps for Quick CIS Benchmark Compliance Blog

CIS Benchmarks Explained: Levels & Steps for Quick CIS Benchmark Compliance

CIS Benchmarks are important for security and compliance. In this blog, you'll get an overview, plus learn how to enforce CIS Benchmarks with Puppet.
Security & Compliance, How to & Use Cases
DISA STIGs: Who Needs Them & How to Enforce DISA STIG Compliance Blog

DISA STIGs: Who Needs Them & How to Enforce DISA STIG Compliance

DISA STIGs outline system security recommendations for DoD contractors, and they're a heavy lift for any DevSecOps team. In this blog, learn how Puppet Enterprise and Security Compliance Enforcement premium features can help you cut down on the time it takes to configure and maintain DISA STIG compliance.
Security & Compliance, Government
SOC 2 Compliance Requirements: Examples, Use Cases + More Blog

SOC 2 Compliance Requirements: Examples, Use Cases + More

Let us help you understand + implement SOC 2 compliance requirements for your specific needs.
Security & Compliance
Cloud Native Security vs. Third-Party Tools: How to Choose (and Why You Might Not Have To) Blog

Cloud Native Security vs. Third-Party Tools: How to Choose (and Why You Might Not Have To)

Your cloud platform probably came with tools to secure and manage the resources you create. We call those cloud-native security tools because they’re proprietary to the vendor you’re using them on. Third-party alternatives, on the other hand, are usually created to be compatible with several cloud provider platforms at once.
Cloud, Security & Compliance
How Automation Can Support Threat Vulnerability Management + Reduce the Attack Surface Blog

How Automation Can Support Threat Vulnerability Management + Reduce the Attack Surface

Threat vulnerability management across your entire attack surface has higher stakes than ever before — here’s where automation can help.
Security & Compliance
Sarbanes-Oxley (SOX) Compliance: How SecOps Can Stay Ready + Pass Your Next SOX Audit Blog

Sarbanes-Oxley (SOX) Compliance: How SecOps Can Stay Ready + Pass Your Next SOX Audit

With high scrutiny and heavy penalties for failing a SOX audit, SOX compliance is a must for publicly traded US companies. Read our blog for the highlights, how IT helps pass a SOX audit + how to stay compliant year-round.
Security & Compliance