1. Continuous authentication: Why it’s getting attention and what you need to know

    User authentication is one of the basic components of any cyber security program. Identifying an individual based on a username, password or other means helps companies ensure that the person is who he or she claims to be when accessing a system, application or network.

    Read Full Article

    1. Continuous authentication is form of dynamic, risk-based authentication, [which] changes the perspective of authentication from an event to a process.
    2. Dynamic, risk-based authentication examines attributes that change and continually looks to validate the authentication.
    3. The technology is compelling because it solves a lot of security and usability issues.
    4. The longer the duration of the session the more likely there is to be decay in authentication.
    5. If you wanted to you could, in theory, set up a session that never even asks for a password.
    6. Those things need to be pushed down to very low percentages.
    7. We've been talking about this for a very long time but didn't have the big data/analytics capabilities and the mobile platform architectures until recently.
  2. Authors