Systems | Development | Analytics | API | Testing

Data Masking Explained in Under 3 Minutes: The Perforce Delphix Approach

Looking for a better way to protect sensitive data while staying compliant with privacy laws like GDPR and CCPA? Meet Perforce Delphix for data masking! Delphix not only secures your data but also fast-tracks innovation in software development, testing, and AI. With Delphix, you can: Discover and mask sensitive data like names, credit card numbers, and more. Use customizable algorithms for production-like but masked data.

The Intersection of GDPR & AI: Navigating Data Protection When Adopting AI

How does GDPR impact AI innovation, and what affects might AI have on regulations like GDPR? According to McKinsey, 78% of companies now use AI in at least one area of their business as of July 2024. But this quick adoption brings challenges for organisations handling data from the European Union and the UK. The main challenge for InfoSec and other enterprise leaders is clear. Using AI effectively means being able to develop faster.

Quantum-Safe IAM: Why Do You Need to Act Today?

Quantum computing hasn't gone mainstream yet, but signs increasingly suggest that it may do so in the near future. Some researchers and industry experts estimate that we could see significant breakthroughs as early as the next decade. This anticipated shift is often referred to as Y2Q similar to Y2K that we had at the beginning of this millennium.

Building a SBOM That Supports EO 14028 & EO 14144 Compliance

In late 2020, hackers infiltrated SolarWinds—a company that produces network, systems, and information technology management software for public and private sector organizations. The resulting trojan went on to infect thousands of government entities and private companies as it was introduced into other software applications through version updates. Microsoft President Brad Smith called it "the largest and most sophisticated attack the world has ever seen.”

How Worldpay Secures Payment Data and Accelerates DevOps | Perforce

Discover how Worldpay, a global leader in payments, modernized its software delivery pipeline while ensuring data security and compliance. In this video, you'll learn how Perforce helped Worldpay: Protect sensitive financial data Accelerate development cycles Automate testing workflows Meet strict regulatory standards in the cloud Watch now to see what's possible.

Securing and Hardening Your P4 Server in Today's Security Landscape

A commitment to user empowerment is at the heart of the Perforce P4 product philosophy. We believe in giving power and control to our users for ultimate configurability. This flexibility enables customers to tailor P4 to their specific workflows, but it also means they are responsible for securing their environment. For these reasons, we strongly recommend assigning the responsibilities of initial server setup, deployment, and ongoing maintenance to an experienced Perforce P4 administrator.

Demystifying the ATO Process: What Government Teams Need to Know About Cloud Security

Table of contents What is an ATO and why does it matter? DoD security levels Federal civilian security levels Key policies governing ATOs Common challenges in obtaining an ATO Streamline the ATO process with an approved cloud The federal government has made cloud computing a strategic priority. Government organizations that embrace the cloud gain security, flexibility, and cost savings.