Skip to main content

Posts Tagged ‘security’

Programmer Working With Program Code

Securely Interacting with AWS Services Using Boto3 API

In today’s cloud-centric world, AWS (Amazon Web Services) stands out as a leading provider of scalable and reliable cloud services. Python’s Boto3 library is a powerful tool that allows developers to interact with AWS services programmatically. However, ensuring secure interactions is crucial to protect sensitive data and maintain the integrity of your applications. Main objective […]

cybersecurity concept Global network security technology, business people protect personal information. Encryption with a padlock icon on the virtual interface.

Fortifying Your Drupal Website: A Comprehensive Security Fortress

Drupal, a robust and versatile content management system (CMS), powers millions of websites worldwide, including those of major corporations, institutions, and governments. While Drupal offers robust security features, it’s imperative to implement best practices to safeguard your website from cyber threats.  Understanding the Evolving Threat Landscape  The digital landscape is continually evolving, and so are […]

How Bilahari Appukuttan Nair Enhances Perficient’s Data Integrity and Security Measures

Our colleagues at Perficient are incredibly talented, compassionate, and committed to accelerating innovation and making meaningful connections around the world. We recently sat down with Bilahari (Hari) Appukuttan Nair, HCM manager, to discover how he utilizes his Human Resources expertise to drive growth for Perficient and our global teams.   Located in Bangalore, India, Hari […]

Innovation. Hands Holding Light Bulb For Concept New Idea Concept With Innovation And Inspiration, Innovative Technology

Sharing Objects in Salesforce

Salesforce’s robust sharing model ensures that users have access to the data they need while maintaining the security and integrity of sensitive information. A key component of this model is the use of Sharing Objects, which control access to individual records. In this blog, we’ll delve into what Sharing Objects are, how to use them […]

Xm Cloud Certified

XM Cloud Certification

Among several other XM Cloud platform enthusiasts, I was invited to take part in the XM Cloud beta certification. Taking into account that I was also involved in beta testing of XM Cloud Developer Fundamentals Training earlier in July (it is available now and I highly recommend the one), I would like to share overall […]

Aicodelock

Your Data In AI

What’s happening to your data in AI? I’ve had countless conversations with tech enthusiasts asking that question. It’s a valid concern, given the rapid expansion of AI technologies and their integration into our daily lives. So, I decided to shed some light on this topic by breaking down the different levels of data usage by […]

Cyber security firewall interface protection concept HTTPS certificates. Businesswoman protecting herself from cyber attacks. Personal data security and banking. stock photo

Local HTTPS for Optimizely, IIS, and Kestrel using certificates (Pt 2)

In part 1 of this two-part blog series on securing your local development with HTTPS and Self-Signed Certificates, I described how to create a local self-signed certificate. In this part, I’ll explain how to use that certificate to safeguard your development environment and make it even more similar to QA & Production. Bind the certificate […]

Cyber security firewall interface protection concept HTTPS certificates. Businesswoman protecting herself from cyber attacks. Personal data security and banking. stock photo

Local HTTPS for Optimizely, IIS, and Kestrel using certificates (Pt 1)

Wasn’t it around 2006 when HTTPS started becoming popular? You’d go to a secure page and almost always see a message saying, “This page contains both secure and nonsecure items. Do you want to display the insecure items?” 1 “Helpful” people online posted how to disable the error. Then browsers got smarter and just stopped […]

Icloud Containers

Perficient Achieves Microsoft Security Designation

We are proud to announce that Perficient has achieved a Microsoft designation in Security (Microsoft 365 and Azure). This further recognizes Perficient as a leading partner in Microsoft security solutions. Last year, Microsoft’s Partner Network (MPN) officially stepped onto the scene under a new name: Microsoft Cloud Partner Program. They also phased out the 18 […]

Processor Chip, Tech Environment, Blockchain Concept

Working with Access Tokens on a Client within a Headless Solutions

Sitecore leaning toward a composable architecture with a mostly headless development model, where all the business logic is shifted to a head app, which also becomes a major point of integration, the majority of which requires some sort of authentication. TL;DR Do not work with an authentication token on a client! But what if I […]

Silhouette Of Businessman Jumping Over The Cliff On Sunset Background, Business Concept Idea

AWS — Site-to-Site VPN Connections Overview

Agenda Autonomous System and BGP what is  Site-to-Site VPN Flow Diagram and Architecture Site-to-Site VPN features Site-to-Site VPN limitations Customer gateway and Virtual Gateway Limitation Alternate VPN Demo What is Autonomous System: The Internet is a network of networks, and autonomous systems are the big networks that make up the Internet. More specifically, an autonomous […]

Business Man, Working And Tablet Of A Employee Doing Digital, Web And Internet Strategy Planning. Corporate Businessman And Tech Worker In The Dark Using Technology To Work On Online And It Analytics

Don’t Snooze on Keeping Sitecore and Related Software up-to-date: .NET Core Edition

Keeping things up to date is critical to maintaining security. But it’s not just security patches that need to be installed. Most software has a shelf life, and support life. If things get out of date, and vendors no longer support some versions they become vulnerable. Microsoft .Net Core A recent example of this is […]

Load More