Kubernetes is one of the fastest-growing open-source projects and the foundation of cloud-native applications. As containers and Kubernetes adoption continue to grow, security, monitoring, data management, and networking are becoming top concerns for enterprises. This week, Red Hat announced its acquisition of StackRox, a leader and innovator in container and Kubernetes-native security. This acquisition will […]
Posts Tagged ‘security’
Six Ways to Protect Yourself and Your Family on Data Privacy Day
This article was co-written by Iman Watson, senior solutions architect, and Kailey Hughes, lead development representative. As we mostly are working remotely these days, securing your space when you’re not in the safeguards of the office walls are critical. Perficient places a high value on data security and has several processes and tools in place […]
Implementation of Multi-Factor Authentication (MFA) in Salesforce
What Is MFA, and Why Is It Important? As the security landscape evolves and threats compromising user credentials become more common, it’s important to implement strong security measures to protect your business and customers. Multi-factor authentication (MFA) is one of the easiest, most effective ways to prevent unauthorized account access and safeguard your Salesforce data. […]
Implementing field level editing restrictions in Episerver
Often times when building content models inside of a CMS, it’s important to consider the various types of editors and the permissions they may have within the eco-system. One technique that I find highly effective is to limit the amount of fields a user may see based on their CMS role. Removing non-essential fields from […]
5+ Areas Financial Institutions Must Focus on in the Current and Post-COVID-19 Era
We have been talking about digital transformation for over 10 years, and the financial industry has been leading the change, albeit at its own pace. This year COVID-19 has been a major disrupter, immutably altering the traditional brick and mortar channel. Financial institutions must begin now to prepare a solid 2-year plan to manage this […]
Why Exploratory Testing is Essential and How to Get it Done
Automation may be the most efficient way to execute a test case, but companies will often need to consider unknowns during the testing process, which requires an ability to perform exploratory testing. Exploratory testing is a manual process used to learn as much as possible about a piece of software. It helps to identify risks, […]
How to Build a Culture of Security Awareness within a Development Team
Applications cannot succeed in today’s world without high levels of security built into them, so training software developers to build robust, secure products is essential. Security can be a complicated topic. Many developers would rather learn a new coding language than focus on security practices, so companies must find ways to motivate them and create […]
Resolving Sitecore SXA 9.3 Core Library JavaScript Security Vulnerabilities
Site themes for a Sitecore SXA site determine the look, feel and interactivity of the user interface. Base themes, included by default in the Media Library, are intended to be leveraged as dependencies for one or more site themes. Base Themes are built on top of a set of core, third-party CSS and JavaScript libraries […]
A Look at DevOps in 2020: Sonatype’s Community Survey
DevOps teams routinely deal with the most sensitive needs of an organization: security, governance, and compliance. However, not every organization is on the same page when it comes to DevOps, which can leave developers feeling overwhelmed and overworked. Sonatype recently released findings from its seventh annual DevOps Community Survey that examines the differences between mature […]
Password Management and Social Intelligence in the Era of Mr. Robot
Great TV shows take deep inspiration from reality and use that insight to teach us and also show us things we might be unaware of amid the chaos of our daily lives. As a tech company, one of our favorite examples of this is Mr. Robot, a show that follows troubled hacker and tech genius […]
DevSecOps Best Practices – Automated Compliance
Secure software practices are at the heart of all system development; doubly so for highly regulated industries such as health-care providers. Multiple regulatory controls are required for the custodianship of patient and customer data, creation of secure software systems, governance of development environments, and ensuring proper management of audit information. As a best-practice it is […]
Why You Should be Using the Principal Permissions View in AEM
Before AEM 6.5, we really only had one UI to manage user permissions. That’s not to say we couldn’t go to the JCR directly and set ACLs, but the user admin screen was just simpler. For instance, take this example from the classic user admin console. Typically, this meant that we would check the root […]