Operations | Monitoring | ITSM | DevOps | Cloud

April 2024

Puppet + Penacity: Secure Critical Infrastructure with Compliance as a Service

Compliance as a Service (CaaS) can help you tackle some of your biggest compliance challenges like quick policy changes, evolving security risks, and talent shortages. In this blog, we’ll give you options for handling compliance (and ultimately, security) based on your current needs, and help you assess next steps toward a more compliant and secure infrastructure.

NIS2: Compliance Requirements, Deadline + Instructions for the NIS2 Directive

The compliance landscape for organizations in the European Union (EU) is heating up again – this time with the second landmark Network and Information Security (NIS2) Directive, set to take effect on October 17, 2024. But what does NIS2 compliance entail? What's the difference between the original NIS1 vs. NIS2? Who needs to comply with NIS2, and what are the penalties for not complying with the new directive?

4 Key Reasons to Switch from SaltStack to Puppet

At first, the differences between common configuration management tools might seem marginal. But choosing the right solution for automated configuration management can make a huge difference. Some tools will have features that align with your organization’s goals, while others won’t. The choice between Puppet vs. SaltStack is one such decision, and it’s a little more nuanced than you might think.

Don't Redo the Work: How to Migrate OS the Easy Way

So, you think you want to migrate OS (AKA operating systems)? In (most) everyone’s life there comes a time where you look toward migrating to another operating system. There are a variety of reasons why — take for instance the recent trouble with CentOS and RedHat. This process change has broadened adoption of new Enterprise Linux variants like Rocky, Alma Linux, or even Ubuntu.

xz Backdoor: What to Know + What to Do About the XZ Utils Vulnerability

The xz backdoor is a vulnerability in XZ Utils, a popular data compression library. The xz backdoor can let unauthorized users gain admin-level access to systems, endangering data security and much more. Read on to learn more about the xz backdoor, who’s affected, and what you can do now to find out if your systems are at risk.