Skip to main content

Posts Tagged ‘security’

Doctor Using Smartphone In Office

Implementation of Multi-Factor Authentication (MFA) in Salesforce

What Is MFA, and Why Is It Important? As the security landscape evolves and threats compromising user credentials become more common, it’s important to implement strong security measures to protect your business and customers. Multi-factor authentication (MFA) is one of the easiest, most effective ways to prevent unauthorized account access and safeguard your Salesforce data. […]

Woman working on her laptop

Implementing field level editing restrictions in Episerver

Often times when building content models inside of a CMS, it’s important to consider the various types of editors and the permissions they may have within the eco-system.  One technique that I find highly effective is to limit the amount of fields a user may see based on their CMS role.  Removing non-essential fields from […]

Corporate Business Team Office Meeting.

5+ Areas Financial Institutions Must Focus on in the Current and Post-COVID-19 Era

We have been talking about digital transformation for over 10 years, and the financial industry has been leading the change, albeit at its own pace. This year COVID-19 has been a major disrupter, immutably altering the traditional brick and mortar channel. Financial institutions must begin now to prepare a solid 2-year plan to manage this […]

Why Exploratory Testing Is Essential And How To Get It Done

Why Exploratory Testing is Essential and How to Get it Done

Automation may be the most efficient way to execute a test case, but companies will often need to consider unknowns during the testing process, which requires an ability to perform exploratory testing. Exploratory testing is a manual process used to learn as much as possible about a piece of software. It helps to identify risks, […]

How To Build A Culture Of Security Awareness Within A Development Team

How to Build a Culture of Security Awareness within a Development Team

Applications cannot succeed in today’s world without high levels of security built into them, so training software developers to build robust, secure products is essential. Security can be a complicated topic. Many developers would rather learn a new coding language than focus on security practices, so companies must find ways to motivate them and create […]

Istock 691171106

Resolving Sitecore SXA 9.3 Core Library JavaScript Security Vulnerabilities

Site themes for a Sitecore SXA site determine the look, feel and interactivity of the user interface. Base themes, included by default in the Media Library, are intended to be leveraged as dependencies for one or more site themes. Base Themes are built on top of a set of core, third-party CSS and JavaScript libraries […]

A Look at DevOps in 2020: Sonatype’s Community Survey

DevOps teams routinely deal with the most sensitive needs of an organization: security, governance, and compliance. However, not every organization is on the same page when it comes to DevOps, which can leave developers feeling overwhelmed and overworked. Sonatype recently released findings from its seventh annual DevOps Community Survey that examines the differences between mature […]

Password Management And Social Intelligence In The Era Of Mr. Robot

Password Management and Social Intelligence in the Era of Mr. Robot

Great TV shows take deep inspiration from reality and use that insight to teach us and also show us things we might be unaware of amid the chaos of our daily lives. As a tech company, one of our favorite examples of this is Mr. Robot, a show that follows troubled hacker and tech genius […]

Network Connection Technology

DevSecOps Best Practices – Automated Compliance

Secure software practices are at the heart of all system development; doubly so for highly regulated industries such as health-care providers.  Multiple regulatory controls are required for the custodianship of patient and customer data, creation of secure software systems, governance of development environments, and ensuring proper management of audit information. As a best-practice it is […]

Why You Should be Using the Principal Permissions View in AEM

Before AEM 6.5, we really only had one UI to manage user permissions.  That’s not to say we couldn’t go to the JCR directly and set ACLs, but the user admin screen was just simpler. For instance, take this example from the classic user admin console. Typically, this meant that we would check the root […]

5G Is Here, and It’s Time to Increase Your Cybersecurity Posture

5G is changing the face of communication and connection. According to Forbes, the technological innovations from 5G could contribute as much as $2.2 trillion to the global economy over the next 15 years. The service will revolutionize the amount of data collection and increasing the number of connected devices and sensors. With the rapid growth […]

Creating a Custom YAML file for the Access Control Tool

In my previous post I talked about how to add service users to the YAML file exported by the AC Tool.  But what if you want to do something else that isn’t currently possible without a recompile? There may be many reasons to create a custom file, the reason I did it was to include […]

Load More