Blog
MFA Configuration: How Automation Lets You Configure & Enforce MFA Compliance at Scale
Multi-factor authentication (MFA) configuration can be a huge challenge for enterprise IT. Learn how an MFA enforcement policy as code keeps it all consistent.
Security & Compliance, Infrastructure Automation
Blog
How to Achieve Zero Trust Adoption in U.S. Government
Zero trust adoption is critical, especially for U.S. government agencies. With changing policies and requirements, it can be tough to stay ahead of everything you need to know. We’ll provide a high-level overview of zero trust adoption + share how automation can help you achieve compliance.
Government, Security & Compliance
Blog
Puppet 8: The Biggest Changes & How to Get It Now [with Video]
Puppet 8 is out and available in Puppet Enterprise and Open Source Puppet. In this blog, we'll explain the highlights, updates you should know about, and how to upgrade from Puppet 7 to Puppet 8.
Products & Services, Ecosystems & Integrations
Blog
Why Move from Open Source Puppet to Puppet Enterprise? Here are 10 Reasons
Considering moving from Open Source Puppet to Puppet Enterprise? In this article, we'll cover typical use cases for the enterprise version of Puppet, why businesses that moved from Puppet's open source version to Puppet Enterprise made the switch, and how customers drive time to value with Puppet Enterprise faster than Open Source Puppet.
How to & Use Cases, Products & Services
Blog
XZ Utils, the xz Backdoor & What We Can Learn from Open Source CVEs
The xz backdoor was a vulnerability in XZ Utils, a popular data compression library. The xz backdoor could let unauthorized users gain admin-level access to systems, endangering data security and much more.
Read on to learn more about the xz backdoor, where it came from, and how to minimize the impact of software vulnerabilities in your systems.
Security & Compliance, How to & Use Cases
Blog
Enhancing Security Best Practices: Lessons from Puppet's Proactive Approach to GitHub Repository Management
We are committed to maintaining the highest standards of security — here's how we further strengthened our security practices thanks to valuable input from an independent security researcher.
Security & Compliance
Blog
Stay Ahead of Known Vulnerabilities with Automated Patch Management
The consequences of not patching are everywhere: remember the Log4j vulnerability that grants hackers complete access to your devices? The best way to prevent this from happening is to use a patched version of Log4j — so why did this become a catastrophic and prolific security vulnerability event?
Security & Compliance