Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Building Strong Linux Security and Compliance: CIS Benchmarks and More

What makes Linux security unique? What special considerations does Linux have across security standards like those set by The Center for Internet Security (CIS)? Every OS has their own unique considerations, and Linux is no different. We’ll also explore how Puppet can fit within your broader Linux security plan to help make hardening Linux that much easier.

Sarbanes-Oxley (SOX) Compliance: How SecOps Can Stay Ready + Pass Your Next SOX Audit

Since its passing in 2002, the Sarbanes-Oxley Act (SOX) has become one of the leading regulatory compliance requirements for U.S. companies. It’s synonymous with corporate governance and financial reporting standards for publicly traded companies. Companies spend millions of dollars and thousands of hours ensuring SOX compliance. Scrutiny is high for organizations subject to it, and the penalties can be crushing.

Strengthen Your Security in the Cloud

Managing security in the cloud and throughout hybrid environments is a challenge with high stakes — customer data, sensitive information, access privileges, and other cloud-based assets are all at risk when an organization uses the cloud. Let’s explore some common cloud-based security concerns and learn how to keep your cloud environment secure.

IT Operations: Making IT Work Better with IT Ops Automation

IT ops is often so focused on solving problems that it can be easy to miss how IT ops contributes to an organization’s overall success, even if you’ve been in IT for a long time. When things get tossed over the wall from development to ops, anyone not in IT ops starts to ask, “What is IT ops?” and “What does IT operations do?” So let’s set the record straight.

Agent vs. Agentless Security: How Do They Stack Up for Secure Infrastructure Automation?

In today’s multi-cloud reality, we at Puppet see that perspectives about agent vs. agentless have changed as security needs have grown in complexity and urgency. Given the changes fact that different architecture models and supporting infrastructure (private & public cloud), the same viewpoint about the best way to keep a business secure is no longer a one-size-fits-all solution. In this blog, we’ll weigh the pros and cons of agent vs.
Featured Post

Keeping up with European security and privacy compliance - the role of infrastructure and automation

The number of security and privacy-related regulations and compliance requirements in the UK and Europe continues to increase. The list reflects governments' growing concerns and emphasis on security and privacy, and for good reason. According to Steve Morgan, founder of Cybersecurity Ventures, if cybercrimes were measured as a country, it would represent the third-largest global economy after the United States and China.

The Future of Configuration Management Software is Policy Enforcement

The old way we’ve thought about configuration management software has passed — we need a new perspective that takes into account the importance of policy enforcement. Let’s dig deeper into what this means for DevOps, your overall security and compliance strategy, and IT.