SANS Whitepaper – Two-Factor Authentication: Can You Choose the Right One? 3.5 3.5.2 3.5.3 Identification and Authentication
This SANS whitepaper focuses on enterprise solutions for two-factor authentication.
This SANS whitepaper focuses on enterprise solutions for two-factor authentication.
This SANS whitepaper discusses vendor-supplied passwords that are embedded in software/hardware.
More on Two-Factor Authentication and it's ineffectivenss defense against identity theft.
This example policy from the State of Georgia provides a starting point for system maintenance.
This whitepaper is directed at IT, Security, and Compliance workers who are responsible for recommending or evaluating security products; or running and managing two-factor authentication infrastructure.
This is an example of an identification and authentication policy for Texas A&M
This example policy describes how information resources shall obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
Gemalto's identity and access management (IAM) solutions allow organizations to meet the evolving needs around cloud applications and mobile devices.
This document provides a study of a unique class of attack and several methods attempting to prevent attacks of a kind.
US-CERT alert that reviews the risk associated with default passwords on internet-connected systems.