1 Reply to this discussion

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members reply.
  • Veretax
    I can think of two ideas that could help.  One is two factor authentication, which can be used to trace the identity of who actually performs certain actions.  Another might be forcing API and privileged functions to require escalated privilege notification to draw such operations to the attention of whoever monitors a given software.
    8,505 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: