Our colleagues at Perficient are incredibly talented, compassionate, and committed to accelerating innovation and making meaningful connections around the world. We recently sat down with Bilahari (Hari) Appukuttan Nair, HCM manager, to discover how he utilizes his Human Resources expertise to drive growth for Perficient and our global teams. Located in Bangalore, India, Hari […]
Posts Tagged ‘security’
Sharing Objects in Salesforce
Salesforce’s robust sharing model ensures that users have access to the data they need while maintaining the security and integrity of sensitive information. A key component of this model is the use of Sharing Objects, which control access to individual records. In this blog, we’ll delve into what Sharing Objects are, how to use them […]
XM Cloud Certification
Among several other XM Cloud platform enthusiasts, I was invited to take part in the XM Cloud beta certification. Taking into account that I was also involved in beta testing of XM Cloud Developer Fundamentals Training earlier in July (it is available now and I highly recommend the one), I would like to share overall […]
Your Data In AI
What’s happening to your data in AI? I’ve had countless conversations with tech enthusiasts asking that question. It’s a valid concern, given the rapid expansion of AI technologies and their integration into our daily lives. So, I decided to shed some light on this topic by breaking down the different levels of data usage by […]
Local HTTPS for Optimizely, IIS, and Kestrel using certificates (Pt 2)
In part 1 of this two-part blog series on securing your local development with HTTPS and Self-Signed Certificates, I described how to create a local self-signed certificate. In this part, I’ll explain how to use that certificate to safeguard your development environment and make it even more similar to QA & Production. Bind the certificate […]
Local HTTPS for Optimizely, IIS, and Kestrel using certificates (Pt 1)
Wasn’t it around 2006 when HTTPS started becoming popular? You’d go to a secure page and almost always see a message saying, “This page contains both secure and nonsecure items. Do you want to display the insecure items?” 1 “Helpful” people online posted how to disable the error. Then browsers got smarter and just stopped […]
Perficient Achieves Microsoft Security Designation
We are proud to announce that Perficient has achieved a Microsoft designation in Security (Microsoft 365 and Azure). This further recognizes Perficient as a leading partner in Microsoft security solutions. Last year, Microsoft’s Partner Network (MPN) officially stepped onto the scene under a new name: Microsoft Cloud Partner Program. They also phased out the 18 […]
Working with Access Tokens on a Client within a Headless Solutions
Sitecore leaning toward a composable architecture with a mostly headless development model, where all the business logic is shifted to a head app, which also becomes a major point of integration, the majority of which requires some sort of authentication. TL;DR Do not work with an authentication token on a client! But what if I […]
AWS — Site-to-Site VPN Connections Overview
Agenda Autonomous System and BGP what is Site-to-Site VPN Flow Diagram and Architecture Site-to-Site VPN features Site-to-Site VPN limitations Customer gateway and Virtual Gateway Limitation Alternate VPN Demo What is Autonomous System: The Internet is a network of networks, and autonomous systems are the big networks that make up the Internet. More specifically, an autonomous […]
Don’t Snooze on Keeping Sitecore and Related Software up-to-date: .NET Core Edition
Keeping things up to date is critical to maintaining security. But it’s not just security patches that need to be installed. Most software has a shelf life, and support life. If things get out of date, and vendors no longer support some versions they become vulnerable. Microsoft .Net Core A recent example of this is […]
People of Perficient: Meet Lorena Garza, Sr. Security and Compliance Analyst
To tell women that they can achieve anything is one thing. However, to actively demonstrate that growth can be accomplished through hard work and dedication is another thing entirely. Women play an integral role in building the path towards gender equality and female empowerment, but it is also up to each one of us to […]
How Good is your AEM Security? – AEMaaCS and 3rd Party Dependencies
Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever. Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/). There are already many resources on generic mitigation for these vulnerabilities. So instead, in this series, I cover security issues and mitigations specific to AEM. In this final post, […]