Versaria + Axway

solving-the-top-11-api-threats

Issue link: https://axway.uberflip.com/i/991646

Contents of this Issue

Navigation

Page 16 of 27

10 http://www.beckershospitalreview.com/healthcare-information-technology/dch-regional-medical-center-employee- allegedly-stole-data-from-computers.html Case in Point: Invisible Attacker In 2014, an employee of a regional medical center in Alabama was accused of unauthorized access and tampering with data from a data clearing house 10 . In cases like this, log files may be used for incident response as well as forensic evidence. In addition, the logging and monitoring services should limit the window of time attackers have to compromise a system.

Articles in this issue

Links on this page

view archives of Versaria + Axway - solving-the-top-11-api-threats