Beyond the cookie: Using network traffic characteristics to enhance confidence in user identity

This paper outlines five major components of a life-cycle approach to defense and how companies can adopt this model to maximize security in the current threat landscape.
Courtney Imbert
August 19, 2014

All papers are copyrighted. No re-posting of papers is permitted