Posts Tagged ‘security’

Istock 641204328

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Welcome back! Last time we talked about controlling file downloads of sensitive content by using a session policy in MCAS. This time we’ll take things a step further and show you how to restrict specific activities like cut/copy, paste, and printing! If you are joining us for the first time, I encourage you to check […]

Istock 636932704 (3)

How to control sensitive data on unmanaged devices with MCAS (Part 1 of 2)

In this day and age, protecting your organization’s sensitive data has started to become exceedingly difficult. Where remote work has become the new norm, you will likely see many end-users using their own unmanaged devices to access corporate information. With this comes the risk of unmanaged devices sending/sharing sensitive information without the ability to control […]

Shipping Containers

Red Hat Acquires StackRox, Key To Containers and Kubernetes-Native Security

Kubernetes is one of the fastest-growing open-source projects and the foundation of cloud-native applications. As containers and Kubernetes adoption continue to grow, security, monitoring, data management, and networking are becoming top concerns for enterprises. This week, Red Hat announced its acquisition of StackRox, a leader and innovator in container and Kubernetes-native security. This acquisition will […]

data privacy day perficient

Six Ways to Protect Yourself and Your Family on Data Privacy Day

This article was co-written by Iman Watson, senior solutions architect, and Kailey Hughes, lead development representative. As we mostly are working remotely these days, securing your space when you’re not in the safeguards of the office walls are critical. Perficient places a high value on data security and has several processes and tools in place […]

Doctor Using Smartphone In Office

Implementation of Multi-Factor Authentication (MFA) in Salesforce

What Is MFA, and Why Is It Important? As the security landscape evolves and threats compromising user credentials become more common, it’s important to implement strong security measures to protect your business and customers. Multi-factor authentication (MFA) is one of the easiest, most effective ways to prevent unauthorized account access and safeguard your Salesforce data. […]

Woman working on her laptop

Implementing field level editing restrictions in Episerver

Often times when building content models inside of a CMS, it’s important to consider the various types of editors and the permissions they may have within the eco-system.  One technique that I find highly effective is to limit the amount of fields a user may see based on their CMS role.  Removing non-essential fields from […]

Corporate Business Team Office Meeting.

5+ Areas Financial Institutions Must Focus on in the Current and Post-COVID-19 Era

We have been talking about digital transformation for over 10 years, and the financial industry has been leading the change, albeit at its own pace. This year COVID-19 has been a major disrupter, immutably altering the traditional brick and mortar channel. Financial institutions must begin now to prepare a solid 2-year plan to manage this […]

Istock 691171106

Resolving Sitecore SXA 9.3 Core Library JavaScript Security Vulnerabilities

Site themes for a Sitecore SXA site determine the look, feel and interactivity of the user interface. Base themes, included by default in the Media Library, are intended to be leveraged as dependencies for one or more site themes. Base Themes are built on top of a set of core, third-party CSS and JavaScript libraries […]

A Look at DevOps in 2020: Sonatype’s Community Survey

DevOps teams routinely deal with the most sensitive needs of an organization: security, governance, and compliance. However, not every organization is on the same page when it comes to DevOps, which can leave developers feeling overwhelmed and overworked. Sonatype recently released findings from its seventh annual DevOps Community Survey that examines the differences between mature […]

Network Connection Technology

DevSecOps Best Practices – Automated Compliance

Secure software practices are at the heart of all system development; doubly so for highly regulated industries such as health-care providers.  Multiple regulatory controls are required for the custodianship of patient and customer data, creation of secure software systems, governance of development environments, and ensuring proper management of audit information. As a best-practice it is […]

Why You Should be Using the Principal Permissions View in AEM

Before AEM 6.5, we really only had one UI to manage user permissions.  That’s not to say we couldn’t go to the JCR directly and set ACLs, but the user admin screen was just simpler. For instance, take this example from the classic user admin console. Typically, this meant that we would check the root […]

5G

5G Is Here, and It’s Time to Increase Your Cybersecurity Posture

5G is changing the face of communication and connection. According to Forbes, the technological innovations from 5G could contribute as much as $2.2 trillion to the global economy over the next 15 years. The service will revolutionize the amount of data collection and increasing the number of connected devices and sensors. With the rapid growth […]

Load More