Beyond the cookie: Using network traffic characteristics to enhance confidence in user identity

This paper outlines five major components of a life-cycle approach to defense and how companies can adopt this model to maximize security in the current threat landscape.
By
Courtney Imbert
August 19, 2014

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg