SANS Whitepaper – Biometrics and User Authentication 3.5 3.5.2 Identification and Authentication
This SANS whitepaper looks at the use of biometrics technology to determine how secure it might be in authenticating users.
This SANS whitepaper looks at the use of biometrics technology to determine how secure it might be in authenticating users.
This SANS whitepaper discusses implementing an additional security layer for wired networks.
This SANS whitepaper focuses on enterprise solutions for two-factor authentication.
More on Two-Factor Authentication and it's ineffectivenss defense against identity theft.
This example policy from the State of Georgia provides a starting point for system maintenance.
This whitepaper is directed at IT, Security, and Compliance workers who are responsible for recommending or evaluating security products; or running and managing two-factor authentication infrastructure.
Gemalto's identity and access management (IAM) solutions allow organizations to meet the evolving needs around cloud applications and mobile devices.
This YouTube video discusses identification and authentication issues in the context of computer security.
Yubikey is a phishing-resistant MFA that stops modern cyber-attacks.