Skip to main content
Robin Tatam, Perforce Puppet — Author profile headshot

Robin Tatam

Senior Technical Marketer and Evangelist

Latest Content from Robin Tatam

DISA STIGs: Who Needs Them & How to Enforce DISA STIG Compliance Blog

DISA STIGs: Who Needs Them & How to Enforce DISA STIG Compliance

DISA STIGs outline system security recommendations for DoD contractors, and they're a heavy lift for any DevSecOps team. In this blog, learn how Puppet Enterprise and Security Compliance Enforcement premium features can help you cut down on the time it takes to configure and maintain DISA STIG compliance.
Security & Compliance, Government
SOC 2 Compliance Requirements: Examples, Use Cases + More Blog

SOC 2 Compliance Requirements: Examples, Use Cases + More

Let us help you understand + implement SOC 2 compliance requirements for your specific needs.
Security & Compliance
Cloud Native Security vs. Third-Party Tools: How to Choose (and Why You Might Not Have To) Blog

Cloud Native Security vs. Third-Party Tools: How to Choose (and Why You Might Not Have To)

Your cloud platform probably came with tools to secure and manage the resources you create. We call those cloud-native security tools because they’re proprietary to the vendor you’re using them on. Third-party alternatives, on the other hand, are usually created to be compatible with several cloud provider platforms at once.
Cloud, Security & Compliance
How Automation Can Support Threat Vulnerability Management + Reduce the Attack Surface Blog

How Automation Can Support Threat Vulnerability Management + Reduce the Attack Surface

Threat vulnerability management across your entire attack surface has higher stakes than ever before — here’s where automation can help.
Security & Compliance
Sarbanes-Oxley (SOX) Compliance: How SecOps Can Stay Ready + Pass Your Next SOX Audit Blog

Sarbanes-Oxley (SOX) Compliance: How SecOps Can Stay Ready + Pass Your Next SOX Audit

With high scrutiny and heavy penalties for failing a SOX audit, SOX compliance is a must for publicly traded US companies. Read our blog for the highlights, how IT helps pass a SOX audit + how to stay compliant year-round.
Security & Compliance
Security Automation Tools: SIEM, SOAR, IAM, Configuration Management + More Tools to Ensure IT Security Blog

Security Automation Tools: SIEM, SOAR, IAM, Configuration Management + More Tools to Ensure IT Security

Security automation tools can make your IT strategy fireproof by taking manual work out of your team’s hands. In this blog, we’ll explain how out how security automation tools can handle some of the biggest day-to-day challenges for enterprises, like security and compliance.
Security & Compliance, Infrastructure Automation
DoD Compliance + DoD Configuration Management: How to Get Compliant with Less Effort Blog

DoD Compliance + DoD Configuration Management: How to Get Compliant with Less Effort

Learn how federal IT teams can automate DoD continuous compliance without the delay, risk, and cost of manual approaches.
Security & Compliance, Government
Managing Compliance: Tips + Strategies for Breaking the Vicious Scan-Fix-Drift Cycle Blog

Managing Compliance: Tips + Strategies for Breaking the Vicious Scan-Fix-Drift Cycle

Managing compliance in IT means defining and enforcing a desired state configuration in your IT systems. Read this blog to get an idea of managing compliance tasks and how to break the scan-fix-drift cycle.
Security & Compliance, Infrastructure Automation
Government Risk Management: How Agencies Balance the Risks vs. Benefits of Digital Transformation Blog

Government Risk Management: How Agencies Balance the Risks vs. Benefits of Digital Transformation

Government risk management is an agency’s plan for responding to dangers to the well-being of citizens. In this blog, learn how agencies can modernize IT + mitigate risk.
Government, Security & Compliance