Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementSecurity Education & Training

Context Matters: Using Machine Learning for Adaptive Authentication

By Frank Cotter
artificial intelligence
August 23, 2019

Imagine an individual attempting to impersonate an employee and walking into your office to steal intellectual property. As they approach the front desk, they’re visibly nervous, and even more conspicuously, wearing strangely formal clothes for an office populated by jean-wearing millennials. Your security team realizes immediately that something is amiss and stops the intruder in their tracks before any harm can occur.

By analyzing context—in this case, out of place clothes and visible discomfort—to inform decision-making, our imaginary security team provides a model for more effective cybersecurity. And though these visual clues don’t transfer to the digital realm, the situation underscores a critical concept in adaptive authentication—using context to set application and data access policies or kickstart security procedures.

Before I explain how this works, it’s helpful to first define adaptative authentication. An adaptive authentication solution is one that uses artificial intelligence—specifically machine learning—in combination with predictive analytics to dynamically adapt security regulations on the basis of contextual and behavioral factors. Put simply, that lets cybersecurity tools examine context when making user access or other security decisions in the same way our security team did when analyzing the approaching imposter. These intelligent capabilities move us further away from passive security solutions and more toward real-time adaptive tools that better secure our workspaces for a world under constant threat of cyberattack.

This assertation is anything but hyperbole. In 2017, a cyberattack occurred every 39 seconds, and odds are that number has only risen in the years since. To combat such an astronomically high frequency of attacks requires using every tool at our disposal, and the ability to use context is a powerful one. Holistically considering a single access request can provide hints that a strict reading of the facts may otherwise ignore, helping cybersecurity tools catch, for example, a login that uses the correct username and password but comes from Pyongyang, North Korea.

(As an aside, if you think that’s an arbitrary location, it’s not. A confidential United Nations report accused the rogue nation of stealing $2 billion from financial institutions and cryptocurrency exchanges through “widespread and increasingly sophisticated” cyberattacks.)

Though the idea to examine context may seem painfully obvious, traditional cybersecurity models typically fail to integrate circumstance into their security protocols. And given the increasing velocity and complexity of cyberthreats, these static solutions are incapable of adequately securing our digital workspaces. That’s why machine learning and adaptive authentication should play a starring role in advanced security solutions and set a new standard for zero-trust environments.

Adaptive authentication relies on machine learning to build a baseline over time of “normal” user behavior. Based on this control group, adaptive authentication solutions can calculate a unique risk score for each interaction. Using that risk score and its associated IT department-defined policy, it can then dynamically adapt security regulations to create both a seamless user access experience and effective security posture. The right solution can grant user access, adopt a pre-set policy, issue an authentication challenge or sound an alert and begin remediation efforts.

Typically, adaptive authentication solutions use behavioral location, time and usage anomalies, network trust and device and app DNA when responding to user requests. With behavioral location, the machine learning engine analyzes anonymized location data and other inputs to learn trusted locations, as well as the frequency and patterns of users, to calculate a behavior and location-based risk score. For trusted locations, administrators can use a geo-fence equivalent in order to predefine specific security and use policies for users within this area. That’s helpful for a financial services company facing stringent customer data regulations. With an adaptive security tool, it can enable access to customer data only when an employee’s mobile device indicates they are on-premise, blocking access as soon as they leave.  

Network trust works similarly to learn the frequency of network use and alter security protocols dynamically based on that profile. For example, the solution would adjust a user’s risk score when they access a new Wi-Fi network for the first time and relax that score as the network is deemed trustworthy.

An adaptive authentication solution can also combine these and other considerations to detect time and usage anomalies, learning how and when employees normally access data to protect against malicious intrusions. Eventually, it can build a uniquely identifying signature for trusted, compliant devices and apps and use that signature to detect and block access attempts by rogue devices.

These factors are analyzed together to build a holistic security solution that provides the most secure unified endpoint management available today. When an intelligent security solution like the one described detects a combination of IP address, location and time that simply can’t be possible based on a user’s last known login, it can immediately deny access and take the appropriate security steps, rather than trusting any login with the right credentials. Furthermore, if an employee is traveling in area known for cyber intrusions originating from certain IP addresses, it can require more rigorous authentication procedures.

For organizations facing relentless cyberattack, finding smarter and more effective cybersecurity tools is among the most important of business objectives. The use of machine learning and predictive analytics for adaptative authentication is the latest step in that direction, helping us integrate what was once a uniquely human ability to holistically assess a situation into our most cutting-edge cybersecurity tools.

KEYWORDS: artificial intelligence (AI) cybersecurity data security machine learning

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Frank cotter

Frank Cotter, SVP Product Management is accountable for the Enterprise portfolio including: BlackBerry UEM, Workspaces, BBMe, Enterprise Identity and AtHoc. Frank has been at BlackBerry since 2009 when it acquired Certicom and he became VP Certicom until 2012 then VP Mobile Computing / Product Management until 2017 then SVP Product Management. He has a B.Sc. and M.Sc. in Electrical Engineering from Queen’s University and received numerous scholarships. He’s served on the Advisory Board for Auvik Networks, as a Toronto French School Foundation Trustee and Chair of the Investment Committee and on Advisory Board University of Waterloo Center for BioEngineering and Biotechnology

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Email, Spymail, Cybersecurity, Cyber espionage

    Using Machine Learning to Fight Fraud, Redirect Security Strategies and Protect Users

    See More
  • AI

    Using AI, machine learning and advanced analytics to protect and optimize business

    See More
  • green code on computer screen

    Why context matters in the future of enterprise security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing