Skip to main content

Posts Tagged ‘security’

Xm Cloud Certified

XM Cloud Certification

Among several other XM Cloud platform enthusiasts, I was invited to take part in the XM Cloud beta certification. Taking into account that I was also involved in beta testing of XM Cloud Developer Fundamentals Training earlier in July (it is available now and I highly recommend the one), I would like to share overall […]

Aicodelock

Your Data In AI

What’s happening to your data in AI? I’ve had countless conversations with tech enthusiasts asking that question. It’s a valid concern, given the rapid expansion of AI technologies and their integration into our daily lives. So, I decided to shed some light on this topic by breaking down the different levels of data usage by […]

Cyber security firewall interface protection concept HTTPS certificates. Businesswoman protecting herself from cyber attacks. Personal data security and banking. stock photo

Local HTTPS for Optimizely, IIS, and Kestrel using certificates (Pt 2)

In part 1 of this two-part blog series on securing your local development with HTTPS and Self-Signed Certificates, I described how to create a local self-signed certificate. In this part, I’ll explain how to use that certificate to safeguard your development environment and make it even more similar to QA & Production. Bind the certificate […]

Cyber security firewall interface protection concept HTTPS certificates. Businesswoman protecting herself from cyber attacks. Personal data security and banking. stock photo

Local HTTPS for Optimizely, IIS, and Kestrel using certificates (Pt 1)

Wasn’t it around 2006 when HTTPS started becoming popular? You’d go to a secure page and almost always see a message saying, “This page contains both secure and nonsecure items. Do you want to display the insecure items?” 1 “Helpful” people online posted how to disable the error. Then browsers got smarter and just stopped […]

Icloud Containers

Perficient Achieves Microsoft Security Designation

We are proud to announce that Perficient has achieved a Microsoft designation in Security (Microsoft 365 and Azure). This further recognizes Perficient as a leading partner in Microsoft security solutions. Last year, Microsoft’s Partner Network (MPN) officially stepped onto the scene under a new name: Microsoft Cloud Partner Program. They also phased out the 18 […]

Processor Chip, Tech Environment, Blockchain Concept

Working with Access Tokens on a Client within a Headless Solutions

Sitecore leaning toward a composable architecture with a mostly headless development model, where all the business logic is shifted to a head app, which also becomes a major point of integration, the majority of which requires some sort of authentication. TL;DR Do not work with an authentication token on a client! But what if I […]

Silhouette Of Businessman Jumping Over The Cliff On Sunset Background, Business Concept Idea

AWS — Site-to-Site VPN Connections Overview

Agenda Autonomous System and BGP what is  Site-to-Site VPN Flow Diagram and Architecture Site-to-Site VPN features Site-to-Site VPN limitations Customer gateway and Virtual Gateway Limitation Alternate VPN Demo What is Autonomous System: The Internet is a network of networks, and autonomous systems are the big networks that make up the Internet. More specifically, an autonomous […]

Business Man, Working And Tablet Of A Employee Doing Digital, Web And Internet Strategy Planning. Corporate Businessman And Tech Worker In The Dark Using Technology To Work On Online And It Analytics

Don’t Snooze on Keeping Sitecore and Related Software up-to-date: .NET Core Edition

Keeping things up to date is critical to maintaining security. But it’s not just security patches that need to be installed. Most software has a shelf life, and support life. If things get out of date, and vendors no longer support some versions they become vulnerable. Microsoft .Net Core A recent example of this is […]

Screenshot 2023 03 17 101312

People of Perficient: Meet Lorena Garza, Sr. Security and Compliance Analyst

To tell women that they can achieve anything is one thing. However, to actively demonstrate that growth can be accomplished through hard work and dedication is another thing entirely.   Women play an integral role in building the path towards gender equality and female empowerment, but it is also up  to each one of us to […]

AEM dispatcher security

How Good is your AEM Security? – AEMaaCS and 3rd Party Dependencies

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/).  There are already many resources on generic mitigation for these vulnerabilities.  So instead, in this series, I cover security issues and mitigations specific to AEM.  In this final post, […]

Dice with words on the faces, reading "Manage Your Risk"

How good is your AEM Security? – Mitigation Tools

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/).  There are already many resources on generic mitigation for these vulnerabilities.  So instead, in this series, I will cover security issues and mitigations specific to AEM.  Here I will […]

Two programmers working together with lines of code superimposed over them

How good is your AEM Security? – Denial of Service

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/) and there are already many resources on generic mitigation for these vulnerabilities.  Instead in this series, I cover security issues and mitigations specific to AEM.  Today’s topic is Denial […]

Load More