Operations | Monitoring | ITSM | DevOps | Cloud

December 2024

CMMC Requirements for 2025: How to Stay CMMC 2.0 Compliant & Prove Maturity at Any Level

CMMC requirements have been shifting recently, with a new version of the Cybersecurity Maturity Model Certification (CMMC 2.0) and distinct levels requiring distinct controls. Mandatory for practically any organization doing business with the US Department of Defense (DoD), CMMC is unavoidable all along the DoD’s supply chain.

Time-Saving Tips for Using Puppet: Build, Run & Manage Your Infrastructure

We’re always rolling out new ways to make Puppet easier to use and maintain so you can run better infrastructure, ditch toil, save time, and increase ROI — fast. This guide will help you with a few need-to-know time saving tricks that can make starting with Puppet, or continuing to manage Puppet, easier and speedier.

Our 2025 Cybersecurity & Compliance Predictions, from AI to Zero Trust

2025 will continue the theme of powerful business and technological transformation under a never-ending barrage of cyber threats that are spawning faster and evolving in more complex ways than ever. To ward off an increasingly sophisticated community of threat actors, we’ll need to innovate faster than the speed of the threat landscape — but how?

HPC Configuration: How Configuration Management Can Enhance AI Workload Efficiency

High-performance computing (HPC) configuration has become paramount for AI workloads. Companies investing in AI workloads often find themselves with predictable problems: Lots of nodes that are hard to integrate and harder to manage together, under-utilized resources, deployment struggles, inconsistent configurations, and drift.