Site Architecture

AEM dispatcher security

How Good is your AEM Security? – AEMaaCS and 3rd Party Dependencies

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/).  There are already many resources on generic mitigation for these vulnerabilities.  So instead, in this series, I cover security issues and mitigations specific to AEM.  In this final post, […]

Istock 1345778718

Fun with custom Sitecore Processors, a look into the future (of your Sitecore content)!

This is a little P.O.C. I worked out a while ago that allowed for the creation of a custom a preview site where a user could tack on a date & time via the QueryString to see what the content would look like on that date. Only requirements were 1. it had to be friendly […]

Dice with words on the faces, reading "Manage Your Risk"

How good is your AEM Security? – Mitigation Tools

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/).  There are already many resources on generic mitigation for these vulnerabilities.  So instead, in this series, I will cover security issues and mitigations specific to AEM.  Here I will […]

Two programmers working together with lines of code superimposed over them

How good is your AEM Security? – Denial of Service

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/) and there are already many resources on generic mitigation for these vulnerabilities.  Instead in this series, I cover security issues and mitigations specific to AEM.  Today’s topic is Denial […]

RNSecurity

How good is your AEM security? – Sling Resolution

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/) and there are already many resources on generic mitigation for these vulnerabilities.  Instead in this series, I cover security issues and mitigations specific to AEM.  Today’s topic is Sling […]

How good is your AEM security? – XSS

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/) and there are already many resources on generic mitigation for these vulnerabilities.  Instead in this series, I cover security issues and mitigations specific to AEM. XSS and AntiSamy As […]

Glacier

Image is everything: Managing assets with the Media Library and benefits of Content Hub DAM

If you’ve ever worked with Sitecore, you know that it comes with a Media Library for storing images for display on the website and other files for download. Images get stored in SQL database in their binary form which can take up a lot of storage space over time. Storing images in the database means […]

Istock 1360521207

Introduction to CQRS, AXON Framework and AXON Server

Introduction We will learn about the Axon Framework, Axon Server, what CQRS is, how it works, and why it is so Popular worldwide in this blog. AXON is an Open-Source Framework for event-driven microservices and domain-driven design. It is a Java Framework that gives developers access to repositories, implementations of crucial components including aggregates, command, […]

A woman helping her male coworker work on code

Cool Things You Can Do with Marketo’s REST API

Hey, friend! This is April Deibert and Sam Schwarz with the Marketo Team, a part of the Digital Marketing Solutions Practice here at Perficient. Over the past year, we’ve worked on some cool client projects where we used our Marketo REST API skills creatively. We thought you might appreciate learning more. If any of these […]

Difference Between Team Site and Communication Site in SharePoint

5 Tips to Be a Fantastic Developer

There are millions of developers worldwide, each of them is working on different platforms and programming languages. Every other developer has a different way of writing their code, but one common aspect is their logical and analytical mindset. This blog will go through some of the daily interactive areas of a developer and situations that […]

A woman searches for content on a mobile website.

How Taxonomy Connects Healthcare Consumers With Content

We’ve all been spoiled by how easy Amazon and other leading e-commerce leaders have made it for us to find related items when we browse their websites. If I’m searching for a pair of shoes or a blender but not finding the exact item I want, I can often find related items that the site […]

Istock 636932704 (3)

Software Attack Surface Analysis

All software systems exist in an insecure state, which creates the need for a way to conduct software attack surface analysis. This is because any useful system must connect in some way with the outside world and therefore contains at least one point of interaction with that world. These communication paths accept data / instructions […]

Load More