https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-4/
This example policy describes how user or device identifiers are managed by receiving appropriate authorization to initially assign a user, selecting a unique identifier, preventing the reuse of identifiers, and disabling the user identifier after a period of inactivity or change in job status.
https://cpl.thalesgroup.com/
Gemalto's identity and access management (IAM) solutions allow organizations to meet the evolving needs around cloud applications and mobile devices.
http://www.cs.tufts.edu/comp/116/archive/fall2015/agoldschmidt.pdf
This document provides a study of a unique class of attack and several methods attempting to prevent attacks of a kind.
https://www.youtube.com/watch?v=pZIlaWhfhpQ
This YouTube video discusses identification and authentication issues in the context of computer security.
https://www.youtube.com/watch?v=Gi-niOoVAm4
This video from SANS educates viewers on the positive and negative aspects of using full disk encryption for security.
https://www.yubico.com/
Yubikey is a phishing-resistant MFA that stops modern cyber-attacks.