Talk With an Expert

Beyond the cookie: Using network traffic characteristics to enhance confidence in user identity

Beyond the cookie: Using network traffic characteristics to enhance confidence in user identity (PDF, 3.37MB)Published: 19 Aug, 2014
Created by:
Courtney Imbert

This paper outlines five major components of a life-cycle approach to defense and how companies can adopt this model to maximize security in the current threat landscape.