Minneapolis, MN, USA
2005
  |  By Puppet
Claude Mythos may be wrapped in hype, but the core signal is real: AI is making vulnerability discovery much faster, which means defenders have less time than ever to patch and enforce secure configurations. The real risk isn’t just smarter models, it’s that security teams will face a flood of new findings while the window between disclosure and exploitation keeps shrinking.
  |  By Puppet
In early 2026, two back-to-back Linux kernel exploits, Copy Fail (CVE-2026-31431) and Dirty Frag (CVE-2026-43284 & CVE-2026-43500), shattered assumptions about how quickly attackers can weaponize disclosed CVEs. Dirty Frag, a zero-day Linux vulnerability that affected most major distributions, had PoC exploits published within hours of its disclosure. It’s a stark reminder: the timeline between vulnerability disclosure and active exploitation has shrunk from weeks to hours.
  |  By Puppet
I’ve been doing this for over thirty years. Sysadmin, ops lead, global teams, and more data centre migrations than I’d like to admit. Site to site, P2V, V2V, cloud, hybrid, all of it. Every migration gets sold as a clean, well-planned transition. None of them are. They go wrong in very predictable ways. Not because moving infrastructure is especially difficult, but because nobody ever has a clear, current view of what’s actually running, what’s changed, and what still matters.
  |  By Puppet
Poland’s implementation of the EU’s NIS2 Directive marks a decisive shift in how organisations think about cybersecurity, resilience, and operational risk. With amendments to the Act on the National Cybersecurity System (KSC Act) entering into force on 3 April 2026, enforcement expectations are now real, national, and significantly stricter than many organisations anticipated – including obligations for security controls, incident response, and supply‑chain governance.
  |  By Puppet
The April 2026 update to UK Cyber Essentials marks an important shift. Not because it introduces radically new security concepts, but because it removes tolerance for inconsistency. With the effective date quickly approaching, many UK organizations are focused on meeting the immediate requirements. That matters. But the more durable story is what these changes reveal about how security and compliance are now expected to operate in real world environments.
  |  By Puppet
Over the past few months, Puppet has partnered with Bryxx to host a series of leadership lunches across Europe, bringing together infrastructure, operations, and security leaders for candid, peer‑to‑peer conversations. These sessions weren’t marketing briefings. They were grounded discussions about what teams are facing right now: tighter regulation, rising security pressure, shifting cloud strategies, and the practical realities of automation and AI.
  |  By Puppet
A sovereign cloud is a cloud environment that keeps data, infrastructure, and access under the control of a specific country or region. It lets organizations meet strict data residency and privacy laws without giving up cloud speed, automation, or modern DevOps practices. As regulations tighten and AI adoption grows, sovereign cloud is becoming the go‑to model for governments, regulated industries, and global enterprises that need both compliance and agility.
  |  By Puppet
This tutorial shows how to use GitHub Copilot with the Puppet Model Context Protocol (MCP) server to generate, validate, and refine a Puppet module—even if you’re new to Puppet development.
  |  By Robin Tatam
CMMC requirements have been shifting recently, with a new version of the Cybersecurity Maturity Model Certification (CMMC 2.0) and distinct levels requiring distinct controls. Mandatory for practically any organization doing business with the US Department of Defense (DoD), CMMC is unavoidable all along the DoD’s supply chain.
  |  By Puppet
It is 2:13 a.m. A mobile alert fires due to elevated error rates on a customer facing API. You jump in. Metrics show a spike in auth failures. The service was not deployed recently. The code appears unchanged. But something is different.
  |  By Perforce Puppet
Learn more about Puppet AI by watching the full length video now!
  |  By Perforce Puppet
Is Your DevOps Strategy Ready for the AI Era? AI is accelerating modern software delivery—but it’s also raising the stakes for security, compliance, and auditability. As AI-driven change increases, many organizations are discovering that incomplete DevOps practices are creating new risk. Based on insights from 800+ global IT professionals, the 2026 State of DevOps Report reveals why vendor‑backed, enterprise‑grade DevOps platforms are becoming critical for managing AI‑driven risk and meeting evolving regulatory demands.
  |  By Perforce Puppet
AI adoption in DevOps is accelerating, but trust, accuracy, and real-world usability still matter. In this conversation, Jason St-Cyr sits down with Jessica Gao, Product Manager at Puppet, to unpack how AI is actually being used in infrastructure and operations teams today, and what’s changed over the last 12–18 months. They dive into why enterprises are moving past generic code generation tools and toward domain-specific, MCP-powered AI that integrates directly into existing workflows.
  |  By Perforce Puppet
Revolutionize your infrastructure by leveraging AI tooling in the Puppet ecosystem. In this technical demonstration, we explore how to significantly reduce the time required to create new Puppet modules using Visual Studio Code, GitHub Copilot, and the Puppet Model Context Protocol (MCP) server.
  |  By Perforce Puppet
Struggling to manage automation across too many tools? Puppet Edge Playbook Runner lets you reuse the you already rely on...without rewriting a thing.
  |  By Perforce Puppet
Puppet Edge’s Playbook Runner lets you consolidate automation while keeping the playbooks you already use.
  |  By Perforce Puppet
Are you struggling to manage infrastructure scale with standalone Ansible playbooks? Discover how to consolidate your automation tools without losing your existing investment. In this demo, we explore how Puppet Edge empowers infrastructure teams to seamlessly execute Ansible Playbooks within Puppet workflows.
  |  By Puppet
As organizations move along their digital transformation journey, they will encounter technical challenges and pitfalls along the way. While the destination offers many benefits, getting there can be hard. It takes experience and knowledge, along with technical expertise, to navigate this path to a more agile, flexible organization. Learn how to get there in this white paper.
  |  By Puppet
A primary goal of most DevOps initiatives is to increase the speed and agility of software development and delivery. Unfortunately, this objective often seems to be at odds with good security practices, reducing the window of time for security assessment and introducing new attack vectors. But DevOps and security don't have to be mutually exclusive. In fact, the principles that drive good outcomes for software development can also lead to more secure infrastructure. Read the ebook for guidance on designing a DevOps workflow that incorporates - and enhances - security.
  |  By Puppet
If you're managing an IT team, you may be turning to DevOps as the path to faster delivery of software. DevOps can help your team become more efficient - and your organization more competitive - but you'll need to be able to communicate to your team why things are changing and how their usual working practices are likely to alter. In this guide we tease out the whys and hows of DevOps as you work with your team and the approaches that make a DevOps initiative successful.
  |  By Puppet
Speeding remediation reduces the cost of compliance and vulnerability of the IT estate. When looking for issues that slow remediation, notice the hand off from security to IT. Download this free resource to learn how the interaction between IT and Security can be improved to speed compliance.
  |  By Puppet
With the proliferation of high-profile hacks, data breaches and ransomware, it's easy to feel insecure about your organization's security these days. But not all security issues have to do with purposeful hacks and attacks. For many IT teams, the challenge is maintaining strict rules and regulatory requirements for everything from credit card data to health information privacy. Failing to maintain compliance can put your organization at risk of everything from lost business to substantial fines - or worse.
  |  By Puppet
With the right foundation and optimizations, your teams can successfully adopt continuous delivery practices - and deliver software faster, with fewer bugs and lower risk. If you're getting started with continuous delivery or evolving your approach, there are a few strategic considerations that can keep you on the right path.
  |  By Puppet
In this paper, we talk about four common challenges to today's software delivery automation and discuss how you can overcome those challenges. Continuous delivery (CD) enables organizations to deliver quality software in record time, helping businesses meet rapidly growing and changing demands. As CD practices and tools have matured, more organizations and teams are beginning - or are well down the path of - their own journeys, using automation to speed up software delivery.
  |  By Puppet
Are you looking to migrate from your on-premises data center to AWS - or to accelerate the process? Or would you like a simple and reliable way to manage your infrastructure and applications across all your environments? Puppet can help.

Puppet is driving the movement to a world of unconstrained software change. Our revolutionary platform is the industry standard for automating the delivery and operation of the software that powers everything around us.

It isn’t humanly possible to keep up with the constant innovation and risks that new technology brings. Automation has become a requirement, and Puppet sets the standard for delivering and managing your IT estate predictably and at scale. Our solutions automate how you continuously deliver, make compliant, remediate, and manage your multi-cloud environment. So you can focus on more important things in your life.

Use Cases:

  • Continuous Delivery: Ship more, do more with the right continuous delivery workflows and tools to increase your development and operations teams’ agility. They lower time to value of your infrastructure and the software it runs.
  • Continuous Compliance: The alphabet soup of regulatory standards and security best practices you try to comply with — and the associated penalties for not doing so — are no joke. Auditors expect your teams to implement and abide by operational, security, and regulatory policies 24/7, and to prove it when they show up.
  • Incident Remediation: With the proliferation of high-profile hacks, data breaches, and ransomware, it’s easy to feel insecure about your organization’s security. You have to protect your company like never before — particularly as your infrastructure grows and diversifies, presenting a broader surface for attackers.
  • Configuration Management: Are you spending more time fighting fires than deploying new, innovative services and applications? You are not alone. Most IT teams say it takes weeks, even months, to deploy critical applications. There’s got to be a better way to manage infrastructure. With automation, you eliminate manual work, minimize risk of human error, and make it possible to deploy fast, safely and reliably.

Make infrastructure actionable, scalable and intelligent.