Continuous User Authentication: Something to Think About

Online, however, just because the right person logs into a site or service, that doesn’t guarantee that you’re still dealing with that same person later in the transaction. Unfortunately, sometimes computers are left unattended without logging out. That’s why, when really sensitive information is involved, there’s a strong case to be made for continuous verification of user identity. Lenny Zeltser talks about that, and gives some examples of ways continuous authentication could be accomplished, in this blog post:

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top