article thumbnail

How to control sensitive data on unmanaged devices with MCAS

Perficient

In today’s blog, I’ll show you how you can block downloading of files with sensitive data to unmanaged devices with the use of session policies in Microsoft Cloud App Security (MCAS). Megan is working on a file that has several different Social Security Numbers of different employees at her organization.

Data 520
article thumbnail

What Is Not Considered a TRACE-Eligible Security and What Should Not Be Reported

Perficient

A TRACE-eligible security does not include a debt security that is issued by a foreign, sovereign government or a money market instrument. Transfers of securities made pursuant to an asset purchase agreement (APA) that is subject to a hearing in a bankruptcy court. A money market instrument is, other than a U.S. Part 4 of 6) ,

Security 474
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Resolving Sitecore SXA 9.3 Core Library JavaScript Security Vulnerabilities

Perficient

Even if your site is working just fine, it is important to keep these third-party dependencies up to date to avoid any security vulnerabilities. At the time of authoring this article, there are two security vulnerability issues related to outdated JS libraries in Core Libraries: jQuery@3.3.1. Lo-Dash@4.17.11. on lines 3 – 4.

Security 377
article thumbnail

BNPL app downloads decline

Payments Dive

total BNPL app downloads for the second quarter fell 19% compared to the year-ago period, Bank of America Securities analysts said. In the U.S.,

America 195
article thumbnail

Case Study: First Mid Bank Fast-Tracks New Market Entry in Commercial Lending

Download now to explore the strategic advantages that transformed their operational landscape and secured their future growth.

article thumbnail

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Perficient

Last time we talked about controlling file downloads of sensitive content by using a session policy in MCAS. was attempting to download an Excel file that contained sensitive information from her personal laptop. PII: Social Security Numbers) or custom expressions. Welcome back! Scenario Recap.

How To 520
article thumbnail

A Look at DevOps in 2020: Sonatype’s Community Survey

Perficient

DevOps teams routinely deal with the most sensitive needs of an organization: security, governance, and compliance. Security: The integration of security controls into automated pipelines continues to be stronger in mature practices, although evolving DevOps practices continue to integrate security controls. The Findings.

Survey 506
article thumbnail

Budget Playbook for Commercial Lenders — Bank and Credit Union Edition

Download the playbook to guide your decision-making process and secure the tools needed to drive efficiency and growth. Our Budget Playbook for Commercial Lenders delivers key strategies to help you navigate these challenges, ensuring your institution is well-positioned for the coming year.

article thumbnail

3 Ways to Protect Your Clients’ Personal Information

Download this guide “Secure Document Collection: 3 Ways to Protect Your Clients’ Personal Information” to learn: Which types of information are considered personally identifiable. Therefore it is imperative that leaders at these organizations take necessary steps to protect their customers, including their sensitive information.

article thumbnail

MLOps 101: The Foundation for Your AI Strategy

Download this comprehensive guide to learn: What is MLOps? How can MLOps tools deliver trusted, scalable, and secure infrastructure for machine learning projects? Why do AI-driven organizations need it? What are the core elements of an MLOps infrastructure?