Skip to main content

Posts Tagged ‘security’

Dice with words on the faces, reading "Manage Your Risk"

How good is your AEM Security? – Mitigation Tools

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/).  There are already many resources on generic mitigation for these vulnerabilities.  So instead, in this series, I will cover security issues and mitigations specific to AEM.  Here I will […]

Two programmers working together with lines of code superimposed over them

How good is your AEM Security? – Denial of Service

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/) and there are already many resources on generic mitigation for these vulnerabilities.  Instead in this series, I cover security issues and mitigations specific to AEM.  Today’s topic is Denial […]

AEM dispatcher security

IP Whitelisting through AEM Dispatcher in 5 easy steps

The dispatcher is used as a load balancing/caching tool by AEM. It can also be used to block anyone from accessing your AEM author instance. This is to ensure that no one outside the client’s network can access it. AEM Author and publisher should never be exposed directly. In most cases, clients may also require […]

Cloud Security In Offshore Software Development Projects

It’s good that Spark Security is turned off by default

Security in Spark is OFF by default, which means you are fully responsible for security from Day One. Spark supports a variety of deployment types, each with its own set of security levels. Not all deployment sorts are safe in every scenario, and none is secure by default. Take the time to analyze your situation, […]

digital data cloud

A Guided Tour of Azure Security Center and Governance Services

Security and governance are the cornerstones of foundational cloud implementation. Microsoft provides powerful services to support deploying, integrating, operating, governing and securing cloud environments to meet any organization’s unique requirements. Whether your organization uses Azure Platform as a Service (PaaS) or Azure Infrastructure as a Service (IaaS), Azure Security Center is a centralized and unified […]

Istock 636932704 (3)

Software Attack Surface Analysis

All software systems exist in an insecure state, which creates the need for a way to conduct software attack surface analysis. This is because any useful system must connect in some way with the outside world and therefore contains at least one point of interaction with that world. These communication paths accept data / instructions […]

Istock 871840512

EU GDPR Compliance – Securing Data in Oracle HCM Cloud

Does your Organization conduct business and have a workforce in the EU? If so, EU General Data Protection Regulation (GDPR) applies to you. EU General Data Protection Regulation (GDPR) is the data privacy and security law that came into effect in May 2018. It requires Organizations that gather and process personal data in the EU […]

Data Security in a SaaS World

Data security is vital to the success of any business. Kyriba offers enhanced security with its extended security package. Your data is secured in transit, while being transmitted, and at rest, while it’s stored. Kyriba uses the latest state of the art security including IP filtering, encryption, connection authentication, and multi-factor authentication to secure your data. […]

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Welcome back! Last time we talked about controlling file downloads of sensitive content by using a session policy in MCAS. This time we’ll take things a step further and show you how to restrict specific activities like cut/copy, paste, and printing! If you are joining us for the first time, I encourage you to check […]

Istock 636932704 (3)

How to control sensitive data on unmanaged devices with MCAS (Part 1 of 2)

In this day and age, protecting your organization’s sensitive data has started to become exceedingly difficult. Where remote work has become the new norm, you will likely see many end-users using their own unmanaged devices to access corporate information. With this comes the risk of unmanaged devices sending/sharing sensitive information without the ability to control […]

GCP is migrating from Container Registry to Artifact Registry

Red Hat Acquires StackRox, Key To Containers and Kubernetes-Native Security

Kubernetes is one of the fastest-growing open-source projects and the foundation of cloud-native applications. As containers and Kubernetes adoption continue to grow, security, monitoring, data management, and networking are becoming top concerns for enterprises. This week, Red Hat announced its acquisition of StackRox, a leader and innovator in container and Kubernetes-native security. This acquisition will […]

data privacy day perficient

Six Ways to Protect Yourself and Your Family on Data Privacy Day

This article was co-written by Iman Watson, senior solutions architect, and Kailey Hughes, lead development representative. As we mostly are working remotely these days, securing your space when you’re not in the safeguards of the office walls are critical. Perficient places a high value on data security and has several processes and tools in place […]

Load More