Posts Tagged ‘security’

Istock 636932704 (3)

Software Attack Surface Analysis

All software systems exist in an insecure state, which creates the need for a way to conduct software attack surface analysis. This is because any useful system must connect in some way with the outside world and therefore contains at least one point of interaction with that world. These communication paths accept data / instructions […]

Istock 871840512

EU GDPR Compliance – Securing Data in Oracle HCM Cloud

Does your Organization conduct business and have a workforce in the EU? If so, EU General Data Protection Regulation (GDPR) applies to you. EU General Data Protection Regulation (GDPR) is the data privacy and security law that came into effect in May 2018. It requires Organizations that gather and process personal data in the EU […]

Data Security in a SaaS World

Data security is vital to the success of any business. Kyriba offers enhanced security with its extended security package. Your data is secured in transit, while being transmitted, and at rest, while it’s stored. Kyriba uses the latest state of the art security including IP filtering, encryption, connection authentication, and multi-factor authentication to secure your data. […]

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Welcome back! Last time we talked about controlling file downloads of sensitive content by using a session policy in MCAS. This time we’ll take things a step further and show you how to restrict specific activities like cut/copy, paste, and printing! If you are joining us for the first time, I encourage you to check […]

Istock 636932704 (3)

How to control sensitive data on unmanaged devices with MCAS (Part 1 of 2)

In this day and age, protecting your organization’s sensitive data has started to become exceedingly difficult. Where remote work has become the new norm, you will likely see many end-users using their own unmanaged devices to access corporate information. With this comes the risk of unmanaged devices sending/sharing sensitive information without the ability to control […]

Shipping Containers

Red Hat Acquires StackRox, Key To Containers and Kubernetes-Native Security

Kubernetes is one of the fastest-growing open-source projects and the foundation of cloud-native applications. As containers and Kubernetes adoption continue to grow, security, monitoring, data management, and networking are becoming top concerns for enterprises. This week, Red Hat announced its acquisition of StackRox, a leader and innovator in container and Kubernetes-native security. This acquisition will […]

data privacy day perficient

Six Ways to Protect Yourself and Your Family on Data Privacy Day

This article was co-written by Iman Watson, senior solutions architect, and Kailey Hughes, lead development representative. As we mostly are working remotely these days, securing your space when you’re not in the safeguards of the office walls are critical. Perficient places a high value on data security and has several processes and tools in place […]

Doctor Using Smartphone In Office

Implementation of Multi-Factor Authentication (MFA) in Salesforce

What Is MFA, and Why Is It Important? As the security landscape evolves and threats compromising user credentials become more common, it’s important to implement strong security measures to protect your business and customers. Multi-factor authentication (MFA) is one of the easiest, most effective ways to prevent unauthorized account access and safeguard your Salesforce data. […]

Woman working on her laptop

Implementing field level editing restrictions in Episerver

Often times when building content models inside of a CMS, it’s important to consider the various types of editors and the permissions they may have within the eco-system.  One technique that I find highly effective is to limit the amount of fields a user may see based on their CMS role.  Removing non-essential fields from […]

Corporate Business Team Office Meeting.

5+ Areas Financial Institutions Must Focus on in the Current and Post-COVID-19 Era

We have been talking about digital transformation for over 10 years, and the financial industry has been leading the change, albeit at its own pace. This year COVID-19 has been a major disrupter, immutably altering the traditional brick and mortar channel. Financial institutions must begin now to prepare a solid 2-year plan to manage this […]

Istock 691171106

Resolving Sitecore SXA 9.3 Core Library JavaScript Security Vulnerabilities

Site themes for a Sitecore SXA site determine the look, feel and interactivity of the user interface. Base themes, included by default in the Media Library, are intended to be leveraged as dependencies for one or more site themes. Base Themes are built on top of a set of core, third-party CSS and JavaScript libraries […]

A Look at DevOps in 2020: Sonatype’s Community Survey

DevOps teams routinely deal with the most sensitive needs of an organization: security, governance, and compliance. However, not every organization is on the same page when it comes to DevOps, which can leave developers feeling overwhelmed and overworked. Sonatype recently released findings from its seventh annual DevOps Community Survey that examines the differences between mature […]

Load More