Operations | Monitoring | ITSM | DevOps | Cloud

From Copy Fail to Dirty Frag: Why Speed-to-Exploit Is Forcing a New Approach to Linux Security

In early 2026, two back-to-back Linux kernel exploits, Copy Fail (CVE-2026-31431) and Dirty Frag (CVE-2026-43284 & CVE-2026-43500), shattered assumptions about how quickly attackers can weaponize disclosed CVEs. Dirty Frag, a zero-day Linux vulnerability that affected most major distributions, had PoC exploits published within hours of its disclosure. It’s a stark reminder: the timeline between vulnerability disclosure and active exploitation has shrunk from weeks to hours.

Creating Successful Migration Workflows with Puppet

I’ve been doing this for over thirty years. Sysadmin, ops lead, global teams, and more data centre migrations than I’d like to admit. Site to site, P2V, V2V, cloud, hybrid, all of it. Every migration gets sold as a clean, well-planned transition. None of them are. They go wrong in very predictable ways. Not because moving infrastructure is especially difficult, but because nobody ever has a clear, current view of what’s actually running, what’s changed, and what still matters.

Poland's KSC Act Is Now in Force: Why NIS2 Compliance Starts with Infrastructure Automation

Poland’s implementation of the EU’s NIS2 Directive marks a decisive shift in how organisations think about cybersecurity, resilience, and operational risk. With amendments to the Act on the National Cybersecurity System (KSC Act) entering into force on 3 April 2026, enforcement expectations are now real, national, and significantly stricter than many organisations anticipated – including obligations for security controls, incident response, and supply‑chain governance.

UK Cyber Essentials is Raising the Bar. Governance is How Teams Keep It There.

The April 2026 update to UK Cyber Essentials marks an important shift. Not because it introduces radically new security concepts, but because it removes tolerance for inconsistency. With the effective date quickly approaching, many UK organizations are focused on meeting the immediate requirements. That matters. But the more durable story is what these changes reveal about how security and compliance are now expected to operate in real world environments.

What EMEA Infrastructure Leaders Are Saying About Security, Compliance, & Hybrid IT

Over the past few months, Puppet has partnered with Bryxx to host a series of leadership lunches across Europe, bringing together infrastructure, operations, and security leaders for candid, peer‑to‑peer conversations. These sessions weren’t marketing briefings. They were grounded discussions about what teams are facing right now: tighter regulation, rising security pressure, shifting cloud strategies, and the practical realities of automation and AI.

What is Sovereign Cloud? What Engineers and IT Leaders Need to Know

A sovereign cloud is a cloud environment that keeps data, infrastructure, and access under the control of a specific country or region. It lets organizations meet strict data residency and privacy laws without giving up cloud speed, automation, or modern DevOps practices. As regulations tighten and AI adoption grows, sovereign cloud is becoming the go‑to model for governments, regulated industries, and global enterprises that need both compliance and agility.

CMMC Requirements for 2026: How to Stay CMMC 2.0 Compliant & Prove Maturity at Any Level

CMMC requirements have been shifting recently, with a new version of the Cybersecurity Maturity Model Certification (CMMC 2.0) and distinct levels requiring distinct controls. Mandatory for practically any organization doing business with the US Department of Defense (DoD), CMMC is unavoidable all along the DoD’s supply chain.

Making the Case for Vendor-Backed Puppet Core

Thousands of organizations rely on open source community builds for infrastructure automation. But if you're tasked with certifying, maintaining, and patching those builds yourself, you know the burden firsthand. The reality is that managing open source internally consumes time, introduces risk, and diverts resources from higher-value initiatives. When critical vulnerabilities emerge, your team scrambles to assess, test, and deploy fixes, all while keeping production environments stable.