Blog
Developer Self-Service: The Benefits for DevOps & How Platform Engineering Makes It Happen
The main purpose of DevOps self-service is to let developers code, build, test, and release software without needing to work with specialists from other departments. In this explainer blog, we explain how developer self-service can make DevOps better.
DevOps, Platform Engineering
Blog
MFA Configuration: How Automation Lets You Configure & Enforce MFA Compliance at Scale
Multi-factor authentication (MFA) configuration can be a huge challenge for enterprise IT. Learn how an MFA enforcement policy as code keeps it all consistent.
Security & Compliance, Infrastructure Automation
Blog
How to Achieve Zero Trust Adoption in U.S. Government
Zero trust adoption is critical, especially for U.S. government agencies. With changing policies and requirements, it can be tough to stay ahead of everything you need to know. We’ll provide a high-level overview of zero trust adoption + share how automation can help you achieve compliance.
Government, Security & Compliance
Blog
Puppet 8: The Biggest Changes & How to Get It Now [with Video]
Puppet 8 is out and available in Puppet Enterprise and Open Source Puppet. In this blog, we'll explain the highlights, updates you should know about, and how to upgrade from Puppet 7 to Puppet 8.
Products & Services, Ecosystems & Integrations
Blog
Why Move from Open Source Puppet to Puppet Enterprise? Here are 10 Reasons
Considering moving from Open Source Puppet to Puppet Enterprise? In this article, we'll cover typical use cases for the enterprise version of Puppet, why businesses that moved from Puppet's open source version to Puppet Enterprise made the switch, and how customers drive time to value with Puppet Enterprise faster than Open Source Puppet.
How to & Use Cases, Products & Services
Blog
XZ Utils, the xz Backdoor & What We Can Learn from Open Source CVEs
The xz backdoor was a vulnerability in XZ Utils, a popular data compression library. The xz backdoor could let unauthorized users gain admin-level access to systems, endangering data security and much more.
Read on to learn more about the xz backdoor, where it came from, and how to minimize the impact of software vulnerabilities in your systems.
Security & Compliance, How to & Use Cases
Blog
Enhancing Security Best Practices: Lessons from Puppet's Proactive Approach to GitHub Repository Management
We are committed to maintaining the highest standards of security — here's how we further strengthened our security practices thanks to valuable input from an independent security researcher.
Security & Compliance