How GitHub's protocol changes impact your Puppet code deployments

GitHub is in the process of improving Git protocol security by removing insecure DSA keys and legacy ciphers, updating requirements on RSA keys, and adding more secure key signature algorithms ECDSA and ED25519. On January 11, GitHub ran a planned brownout event day to shake out affected clients. Our team at Puppet discovered that many users of Code Manager and r10k were affected by this change.

What SecOps Teams Can Expect in 2022

Traditionally, most organizations have had siloed departments wherein teams’ activities are highly separated and the objectives within organizational structures are divided. This operational methodology has brought about friction – especially within the IT department, where developers and ITOps lack collaboration.

Digital-First SecOps: A CISO Perspective

Businesses of all types, and across all verticals, have gone digital-first. This shift enables many benefits, such as greater scalability and speed. But it also amplifies the security and compliance challenges that arise from digital systems. For CISOs, this shift amplifies the need to apply the same level of automation, speed, and business-wide accessibility for security that digitization has brought to other aspects of the business. In short, modern businesses need to adopt a digital-first approach to SecOps itself.

Five worthy reads: Hyperautomation-Embracing the inevitable

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn what hyperautomation is all about, why it is a growing trend, and much more. Illustrated by Derrick Deepak Roy Digital transformation has been accelerating at a pace so fast that organizations all over the globe are making frantic changes to their infrastructures to keep up.

Network Automation: What It Is, Where It's Heading, and How to Start Planning

Automation. It’s a common term. Some may call it a buzzword, even. When it comes to building a network, it’s usually not your first consideration. After all, what’s most important is getting users and devices online—and keeping them there. Isn’t automating the network an advanced step? Are we even capable of making network monitoring and management automatic?

Mastering Secrets Management in Rundeck

Presented by Craig Hobbs, Sr. Solutions Consultant at Rundeck by PagerDuty Secure IT infrastructure is well protected by access keys, passwords, and other credentials. Admins need these secrets to gain access, as does any automation executed by Rundeck. Rundeck has rich support for secrets management with native key storage, as well as integrations with best-of-breed standardized solutions. In this webinar, we’ll cover best practices for working with Rundeck’s runbook automation platform in securing IT infrastructure.

How Proactive Technology Support Can Help You Win the War for Talent

According to the U.S. Bureau of Labor Statistics, employers are losing more than four million workers every single month. That, coupled with the record number of 11 million open jobs, has left businesses across the board scrambling to crack the code and find a way to not only attract top talent – but, more importantly – keep them from jumping ship at the next best opportunity.