Continuous adaptive trust: Sustaining trust in the age of continuous risk
By Jay Reddy, Head of Growth, ManageEngine
In early 2025, cyber fraud losses in India were reported to have crossed ₹36,450 crore, driven largely by phishing-led UPI attacks, SIM-swap exploitation, and credential compromise. Globally, account compromise surged 389 percent year over year, representing 50 percent of all threats. When attackers possess legitimate credentials, they bypass traditional defences and move from access to exploitation faster than most detection mechanisms can respond.
Regulatory tightening reflects this tension. The Reserve Bank of India’s mandate for two-factor authentication beginning in April 2026 strengthens verification at entry. However, stronger authentication alone addresses only initial verification. It does not resolve suspicious behaviour after access is granted.
Why authentication strength alone cannot sustain identity trust
In most enterprises, identity decision-making spans multiple control planes. Authentication systems evaluate context at login. Privileged access tools enforce elevation policies independently. Cloud authorisation layers apply their own logic within distributed environments....
Copyright of this story solely belongs to expresscomputer.in. To see the full text click HERE