Forms are an essential part of any website, enabling visitors to get in touch, subscribe, or request information. But when spam bots flood your Sitecore forms with junk submissions, it can quickly become a problem, messing with your data, wasting resources, and making genuine leads harder to manage. In this post, we’ll explore practical and […]
Posts Tagged ‘security’
Moderate Image Uploads with AI/GenAI & AWS Rekognition
As we all know, in the world of reels, Photos, and videos, Everyone is creating content and uploading to public-facing applications, such as social media. There is no control over the type of images users upload to the website. Here, we will discuss how to restrict inappropriate photos. The AWS Rekognition Service can help you […]
Honeypot Fields in Sitecore Forms
When working with forms, a common problem is spam form submissions. There are several ways to prevent this problem. Using CAPTCHAs to stop bot submissions is the most popular technique to avoid this issue. However, bots can now bypass CAPTCHA security. This is where honeypot fields come in: a simple, invisible, and user-friendly way to […]
How the Change to TLS Certificate Lifetimes Will Affect Sitecore Projects (and How to Prepare)
TLS certificate lifetimes are being significantly reduced over the next few years as part of an industry-wide push toward greater security and automation. Here’s the phased timeline currently in place: Now through March 15, 2026: Maximum lifetime is 398 days Starting March 15, 2026: Reduced to 200 days Starting March 15, 2027: Further reduced to […]
Securely Interacting with AWS Services Using Boto3 API
In today’s cloud-centric world, AWS (Amazon Web Services) stands out as a leading provider of scalable and reliable cloud services. Python’s Boto3 library is a powerful tool that allows developers to interact with AWS services programmatically. However, ensuring secure interactions is crucial to protect sensitive data and maintain the integrity of your applications. Main objective […]
Fortifying Your Drupal Website: A Comprehensive Security Fortress
Drupal, a robust and versatile content management system (CMS), powers millions of websites worldwide, including those of major corporations, institutions, and governments. While Drupal offers robust security features, it’s imperative to implement best practices to safeguard your website from cyber threats. Understanding the Evolving Threat Landscape The digital landscape is continually evolving, and so are […]
How Bilahari Appukuttan Nair Enhances Perficient’s Data Integrity and Security Measures
Our colleagues at Perficient are incredibly talented, compassionate, and committed to accelerating innovation and making meaningful connections around the world. We recently sat down with Bilahari (Hari) Appukuttan Nair, HCM manager, to discover how he utilizes his Human Resources expertise to drive growth for Perficient and our global teams. Located in Bangalore, India, Hari […]
Sharing Objects in Salesforce
Salesforce’s robust sharing model ensures that users have access to the data they need while maintaining the security and integrity of sensitive information. A key component of this model is the use of Sharing Objects, which control access to individual records. In this blog, we’ll delve into what Sharing Objects are, how to use them […]
XM Cloud Certification
Among several other XM Cloud platform enthusiasts, I was invited to take part in the XM Cloud beta certification. Taking into account that I was also involved in beta testing of XM Cloud Developer Fundamentals Training earlier in July (it is available now and I highly recommend the one), I would like to share overall […]
Your Data In AI
What’s happening to your data in AI? I’ve had countless conversations with tech enthusiasts asking that question. It’s a valid concern, given the rapid expansion of AI technologies and their integration into our daily lives. So, I decided to shed some light on this topic by breaking down the different levels of data usage by […]
Local HTTPS for Optimizely, IIS, and Kestrel using certificates (Pt 2)
In part 1 of this two-part blog series on securing your local development with HTTPS and Self-Signed Certificates, I described how to create a local self-signed certificate. In this part, I’ll explain how to use that certificate to safeguard your development environment and make it even more similar to QA & Production. Bind the certificate […]
Local HTTPS for Optimizely, IIS, and Kestrel using certificates (Pt 1)
Wasn’t it around 2006 when HTTPS started becoming popular? You’d go to a secure page and almost always see a message saying, “This page contains both secure and nonsecure items. Do you want to display the insecure items?” 1 “Helpful” people online posted how to disable the error. Then browsers got smarter and just stopped […]