Skip to main content

Posts Tagged ‘security’

Istock 871840512

EU GDPR Compliance – Securing Data in Oracle HCM Cloud

Does your Organization conduct business and have a workforce in the EU? If so, EU General Data Protection Regulation (GDPR) applies to you. EU General Data Protection Regulation (GDPR) is the data privacy and security law that came into effect in May 2018. It requires Organizations that gather and process personal data in the EU […]

Data Security in a SaaS World

Data security is vital to the success of any business. Kyriba offers enhanced security with its extended security package. Your data is secured in transit, while being transmitted, and at rest, while it’s stored. Kyriba uses the latest state of the art security including IP filtering, encryption, connection authentication, and multi-factor authentication to secure your data. […]

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Welcome back! Last time we talked about controlling file downloads of sensitive content by using a session policy in MCAS. This time we’ll take things a step further and show you how to restrict specific activities like cut/copy, paste, and printing! If you are joining us for the first time, I encourage you to check […]

Istock 636932704 (3)

How to control sensitive data on unmanaged devices with MCAS (Part 1 of 2)

In this day and age, protecting your organization’s sensitive data has started to become exceedingly difficult. Where remote work has become the new norm, you will likely see many end-users using their own unmanaged devices to access corporate information. With this comes the risk of unmanaged devices sending/sharing sensitive information without the ability to control […]

GCP is migrating from Container Registry to Artifact Registry

Red Hat Acquires StackRox, Key To Containers and Kubernetes-Native Security

Kubernetes is one of the fastest-growing open-source projects and the foundation of cloud-native applications. As containers and Kubernetes adoption continue to grow, security, monitoring, data management, and networking are becoming top concerns for enterprises. This week, Red Hat announced its acquisition of StackRox, a leader and innovator in container and Kubernetes-native security. This acquisition will […]

data privacy day perficient

Six Ways to Protect Yourself and Your Family on Data Privacy Day

This article was co-written by Iman Watson, senior solutions architect, and Kailey Hughes, lead development representative. As we mostly are working remotely these days, securing your space when you’re not in the safeguards of the office walls are critical. Perficient places a high value on data security and has several processes and tools in place […]

Doctor Using Smartphone In Office

Implementation of Multi-Factor Authentication (MFA) in Salesforce

What Is MFA, and Why Is It Important? As the security landscape evolves and threats compromising user credentials become more common, it’s important to implement strong security measures to protect your business and customers. Multi-factor authentication (MFA) is one of the easiest, most effective ways to prevent unauthorized account access and safeguard your Salesforce data. […]

Woman working on her laptop

Implementing field level editing restrictions in Episerver

Often times when building content models inside of a CMS, it’s important to consider the various types of editors and the permissions they may have within the eco-system.  One technique that I find highly effective is to limit the amount of fields a user may see based on their CMS role.  Removing non-essential fields from […]

Corporate Business Team Office Meeting.

5+ Areas Financial Institutions Must Focus on in the Current and Post-COVID-19 Era

We have been talking about digital transformation for over 10 years, and the financial industry has been leading the change, albeit at its own pace. This year COVID-19 has been a major disrupter, immutably altering the traditional brick and mortar channel. Financial institutions must begin now to prepare a solid 2-year plan to manage this […]

Why Exploratory Testing Is Essential And How To Get It Done

Why Exploratory Testing is Essential and How to Get it Done

Automation may be the most efficient way to execute a test case, but companies will often need to consider unknowns during the testing process, which requires an ability to perform exploratory testing. Exploratory testing is a manual process used to learn as much as possible about a piece of software. It helps to identify risks, […]

How To Build A Culture Of Security Awareness Within A Development Team

How to Build a Culture of Security Awareness within a Development Team

Applications cannot succeed in today’s world without high levels of security built into them, so training software developers to build robust, secure products is essential. Security can be a complicated topic. Many developers would rather learn a new coding language than focus on security practices, so companies must find ways to motivate them and create […]

Istock 691171106

Resolving Sitecore SXA 9.3 Core Library JavaScript Security Vulnerabilities

Site themes for a Sitecore SXA site determine the look, feel and interactivity of the user interface. Base themes, included by default in the Media Library, are intended to be leveraged as dependencies for one or more site themes. Base Themes are built on top of a set of core, third-party CSS and JavaScript libraries […]

Load More