-
How Finance Tech Will Change After the 2025 EU DORA Mandate
Under DORA, EU financial technology organisations are on the hook for new & enhanced security expectations. Read our predictions & how fintech can keep up.
-
Automating Government Compliance Requirements
Discover how automating government compliance regulations can save costs, reduce risks, and streamline business processes.
-
How to Take Your Vulnerability Management Program to the Next Level: Automation Strategies & Tactics
A vulnerability management program scans, patches & documents software vulnerabilities. Here's our advice on improving your strategy for better IT security.
-
Puppet’s Strong Performance in The Forrester Wave™: Infrastructure Automation Platforms, Q4 2024 & What It Means for Your Enterprise
See why Puppet is a Strong Performer in the Forrester Wave™ for Infrastructure Automation. Learn about our top marks in strategic vision and compliance, and how we're addressing future
-
Cloud Repatriation: Examples, 2025 Trends & Tips for Reverse Migration
If you moved to the cloud only to find it's not all it’s cracked up to be, cloud repatriation might be a great next step. This blog covers what to consider and questions to ask when
-
Windows Patching: The Quirks of Windows Patch Management & How to Stay Ready for Patch Tuesday
Windows patching relies on proprietary tools & processes that can sometimes be frustrating. Get a heads up on pitfalls & best practices for Patch Tuesday here.
-
How to Get Started With Agentless Automation
Agentless automation offers a cost-effective and efficient approach to automating your infrastructure management. So, what does it mean to do agentless automation?
-
Class Containment in Puppet Enterprise
Class containment is an advanced topic in Puppet, and something that new users often find confusing. In the past, elaborate systems of anchor resources needed to be created to order
-
How Automation Covers the Australian Cyber Security Centre Essential Eight
It seems that virtually every day, another threat to cybersecurity presents itself. In response to this ongoing concern, the Australian Cyber Security Centre's Essential Eight can help