Remove Compliance Remove Policies Remove Security
article thumbnail

New Microsoft Security and Compliance Certifications (Feb 2021)

Perficient

This morning I was sipping on my cup of coffee and browsing through Microsoft’s Learn page when I stumbled upon a few new certifications and exams around Microsoft Security and Compliance ! Certification – Microsoft Certified: Security Operations Analyst Associate. Let’s jump in!

article thumbnail

DevSecOps Best Practices ? Automated Compliance

Perficient

Secure software practices are at the heart of all system development; doubly so for highly regulated industries such as health-care providers. As a best-practice it is recommended to adopt automation of certain security audits, integration of compliance oversight into key development process areas (e.g. Source Code Analysis.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Red Hat Acquires StackRox, Key To Containers and Kubernetes-Native Security

Perficient

As containers and Kubernetes adoption continue to grow, security, monitoring, data management, and networking are becoming top concerns for enterprises. This week, Red Hat announced its acquisition of StackRox , a leader and innovator in container and Kubernetes-native security. StackRox’s security capabilities include: Visibility.

Security 433
article thumbnail

FDIC Extends Timeline to Comply with New Digital Signage Requirements

Perficient

The Federal Deposit Insurance Corporation (“FDIC”) recently announced that it is providing financial institutions additional time to get new process and systems in place by extending the compliance date for the new FDIC signage and advertising rule (Part 328, subpart A) from January 1, 2025, to May 1, 2025.

FDIC 221
article thumbnail

How to control sensitive data on unmanaged devices with MCAS

Perficient

In today’s blog, I’ll show you how you can block downloading of files with sensitive data to unmanaged devices with the use of session policies in Microsoft Cloud App Security (MCAS). Megan is working on a file that has several different Social Security Numbers of different employees at her organization.

Data 520
article thumbnail

How Nearshore Software Development Can Still Work in Highly Regulated Industries

Perficient

However, companies within certain industries may be more hesitant to incorporate a nearshore delivery model into their software development projects due to federal regulations around information and data security. Compliance Considerations. Security is the highest priority when searching for a nearshore partner.

Software 508
article thumbnail

Cannabis lending for financial institutions: Opportunities, risks, and best practices

Abrigo

CRBs frequently face difficulties securing loans or even maintaining a bank account, leaving them to manage their cash businesses outside of traditional financial institutions. Imagine the stress of running a thriving enterprise while worrying about security risks tied to cash-intensive operations. Next, set clear internal policies.

Lending 195