security Articles - Perficient Blogs
Blog

Posts Tagged ‘security’

  • Topics
  • Industries
  • Partners

Explore

Topics

Industries

Partners

Tackle Security Concerns for Application Modernization

In our previous post, Create Your Transformation Roadmap for Application Modernization, we offered guidance to prepare your organization for successful cloud adoption. Part 2 of this series addresses some of the security concerns you may stumble upon in your cloud journey. We also share some best practices for infusing security across your organization. Questions about […]

Read more

How to Create and Configure SSL Key and Trust Stores Part 1/3

This post will be the first in a multi-part series talking about configuring various key stores and trust stores IBM MQ and IBM Integration Bus and populating them with certificates. General Information Key stores and trust stores are files in a proprietary format. Key stores hold certificates that an application sends across during the SSL […]

Read more

How To Use The AWS API With S3 Buckets In Your Pen Test

Pen testers often need to stage payloads and other tools on servers outside of their own infrastructure.  In this post I’ll show you how to use the Amazon AWS command line interface (CLI) to dynamically create and manage S3 buckets that you can use in your own pen tests.  I’ll also show you how to […]

Read more

Ransomware Attack Affects 23 Texas Local Government Agencies

In what appears as a highly coordinated attack by a single actor, 23 local government agencies in the state of Texas were hit with ransomware. This extends the recent trend where local government entities were targeted, some of which have led to the attackers being paid millions of dollars via crypto-currency. A first line of […]

Read more

Security and Compliance in Microsoft Teams

Whether your company has 10 people or 10,000 people, security measures need to be in place to ensure a safe, secure, and compliant environment for your end users. Many companies will often be required to adhere to certain security regulations and compliance standards but rest assured Microsoft has your back.  Microsoft understands this need for […]

Read more

Microsoft Intelligent Security Solutions

Part 1 – Microsoft Secure Score 56 Security Actions You Can Take Today to Improve Your Security Posture Microsoft has been investing substantially in security and compliance since 2004, and today that investment protects all Microsoft products, but none more so than Office 365 and Azure. One shining culmination of that investment is Microsoft Secure […]

Read more

Healthcare Cloud Usage Grows Despite Doubts

The healthcare industry is leaning upon cloud more heavily, but there is still mistrust regarding its security, according to research presented at HIMSS 2019. The insights, shared by HIMSS Media’s Janet King at the conference, show contradictions around cloud in the industry. Security worries persist despite cloud usage growing. Here are the five key takeaways […]

Read more

Oracle Fusion SaaS Security with Oracle Analytics Cloud

The question that is often asked is: Can we leverage the same security we already have in Oracle Fusion SaaS (which includes users, duties, roles and security policies) to secure data in Oracle Analytics Cloud (OAC – an Oracle PaaS)? The answer is Yes. To understand better how this is possible, keep reading. This blog […]

Read more

How to Create an OAC Data Replication from Oracle SaaS?

Oracle Analytics Cloud offer several options when it comes to loading data from Oracle SaaS (such as Financials, HCM, Sales, etc…). Using OAC against Oracle SaaS has several advantages, and most importantly being able to perform analytics on data that is not part of the SaaS application. You may be familiar with using Data Sync […]

Read more

How to Integrate Oracle SaaS Data into Oracle Analytics Cloud?

Reporting on Oracle Fusion and non-Fusion SaaS Apps from Oracle Analytics Cloud (OAC) is a common solution to performing cross-functional reporting from one or more Cloud and non-Cloud applications. The BI capabilities within each of the transaction systems, whether Financials, HCM, Sales or other, are limited when it comes to integrated reporting with external data […]

Read more

Custom Data Connector for Power BI Using MicroStrategy

The MicroStrategy platform allows custom data connectors to access data from nearly any source, which includes Microsoft Power BI. In order to bring the best of both worlds together, Perficient’s MicroStrategy experts have developed a custom data connector to help Power BI users do just that. This custom connector integrates the two products and provides […]

Read more

Preparing for TLS 1.0/1.1 Deprecation and Why You Should Care

As you may have heard through the grape vine, TLS 1.0/1.1 will be deprecated starting October 31st, 2018. So what does that mean and why should you care? In this article we’ll discuss what this means for users of Lync/Skype for Business on-premises and Skype for Business Online and why TLS 1.2 will be mandatory going […]

Read more

4 Benefits of a Single Sign On in Healthcare

Wouldn’t it be nice if there was a single sign on (SSO) for your daily work routine? How many moments would be spent helping a patient, instead of staring at a screen trying to remember usernames or password credentials? Take a moment and consider this. How many applications, websites, and dashboards do you have to […]

Read more

IoMT and the Necessity for Cybersecurity

Cyber-security: a continuous mission to supervise, support, and evolve data protection. Healthcare providers remain aware and proactive in regards to cyber-attacks or malware that feature threats to patient records, and internal documents. By continuously remaining alert, healthcare organizations can confirm their IoMT networks are secure. What is Internet of Medical Things (IoMT)? IoMT features a […]

Read more

How Microsoft Word “Protected View” Stops Information Leaks

Microsoft Word has long offered support for loading images and templates over the network.  This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates.  Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials.  […]

Read more

Lightning Flow, Data Security, Summer ’18 Enhancements & More

Top Salesforce Updates You Need to Know Einstein, Lightning & More: What’s New in Salesforce Sales Cloud in Summer ’18 Top 5 Jaw-Dropping Salesforce Communities Summer ’18 Enhancements Why is Data Security Important to Me? Running an Integrated ABM Campaign in 5 Steps Connecting to Salesforce in Outlook Perficient’s Award-Winning Partnership with Salesforce What Organizations […]

Read more

Extreme Customer Experience Makeover

Digital innovation continues to disrupt industries at lightning speed. Today’s organizations are transforming their entire business – from strategy to operations, technology to culture – to better deliver value to their customers. In 2017, we compiled the top 10 trends leaders needed to know when it came to their digital transformation journey. In this 10-week […]

Read more

Salesforce Shield Platform Encryption: Keeping Data Safe

As mentioned in our intro blog, Salesforce Shield: Bringing Compliance to the Cloud, customer information security is critical to Salesforce’s success. In this blog, we’re going to take a look at another part of Salesforce Shield Platform Encryption. When regulations require more protection Your data is already very secure. But to meet the increasingly demanding […]

Read more

Maximo Application Data Import Export – Data Loading

In this first part of my Maximo Data Loading series, I will cover the Maximo Application Data Import Export functionality. This is great functionality that was introduced in version 7.5, and many today still do not utilize it’s functionality. This allows you to go into any Maximo application, and export data from a query or […]

Read more

Overcoming Challenges to Blockchain Adoption

Blockchain was 2017’s technology buzzword of the year, inspired by developments in cryptocurrencies and a desire for more secure transactions. Blockchain technology has the potential to transform enterprise business models through cost reduction and increased operational efficiency. Yet, there are challenges to adopting Blockchain, as it is a nascent technology. Some of these challenges include: […]

Read more

Subscribe to the Weekly Blog Digest:

Sign Up