π Welcome to Unlocked
Authentication is designed to protect access β but increasingly, itβs testing user patience.
Multi-factor authentication, continuous verification, and risk-based controls have reshaped modern identity security. At the same time, theyβve introduced friction that users quietly push back against through workarounds, fatigue, and disengagement.
This week, Unlocked examines the authentication paradox: how stronger security controls can erode trust in the user experience β and why adaptive, context-aware access models are emerging as the path forward.
π Where MFA Fails: Fatigue, Bypassing, and SIM Swapping
MFA is often hailed as a silver bullet for identity security. And itβs true β it blocks over 99% of basic account-compromise attempts (Microsoft Security Blog).
But as attackers evolve and users grow weary, cracks have begun to show:
MFA Fatigue Attacks: Adversaries bombard users with endless push notifications until they approve out of annoyance or confusion.
The Uber breach of 2022 was a textbook example β a single exhausted employee approved a fraudulent MFA prompt.SIM Swapping: Criminals hijack mobile numbers through social engineering, intercepting SMS codes to bypass verification (FCC Consumer Alert).
MFA Bypass Kits: Available on dark-web marketplaces, these tools automate phishing of MFA tokens, turning 2FA into 1.5FA at best (CISA Alert).
The takeaway: MFA is necessary β but not sufficient.
Authentication has to evolve beyond static codes and tired users.
π§ Adaptive Access in Context: Behavior, Device, and Risk Scoring
Enter adaptive authentication β a smarter, context-aware evolution of MFA.
Instead of treating every login equally, adaptive access evaluates the context around each attempt:
Behavior: Is the typing rhythm, mouse movement, or session timing consistent with normal patterns?
Device Trust: Has this device been used before, and is it managed or enrolled?
Location & Network: Is the login coming from a known region or an anonymized proxy?
Risk Scoring: Combining these signals to dynamically decide whether to step up authentication β or let it flow seamlessly.
In Gartnerβs Identity-First Security framework, adaptive access is becoming the defining feature of zero trust β replacing static MFA prompts with real-time trust assessments (Gartner Research).
The result: stronger security for abnormal behavior, and less friction for legitimate users. When security adapts to context, convenience becomes a feature β not a casualty.
π₯οΈ Designing for Secure Convenience β Lessons from Consumer UX
If youβve ever unlocked a smartphone with your face or your watch, youβve experienced what βsecure convenienceβ feels like.
In the enterprise, though, UX often takes a back seat to compliance checkboxes. The result? Employees circumvent controls β writing passwords on sticky notes or using personal devices to skip MFA fatigue.

Thereβs a lesson here from the consumer world: security adoption follows usability.
According to a Forrester study, users are five times more likely to engage with secure tools that donβt interrupt workflow.
For CISOs and IT teams, that means:
Prioritize frictionless proximity-based access over constant re-authentication.
Design trust UX β micro-delays, notifications, and recovery options that feel human, not hostile.
Track engagement metrics, not just security metrics; usability is part of defense.
Apple and Googleβs shift toward passkeys shows that users donβt reject security β they reject bad security UX.
βοΈ The Road to Frictionless Zero Trust
Zero trust doesnβt have to mean zero patience.
The next generation of identity systems β including proximity-based MFA, device reputation, and AI-driven anomaly detection β will redefine how access feels.
As attackers use AI to mimic human behavior, defenders need AI-native systems to analyze patterns faster than people can.
Thatβs why anomaly detection and adaptive access intelligence are converging β to neutralize AI-powered threats with AI-powered defense.
Ultimately, the future of authentication isnβt about adding steps β itβs about adding intelligence.
π‘ Unlocked Tip of the Week
Audit your MFA setup this week.
If every login triggers the same challenge, youβre not being βsecureβ β youβre being predictable.
Implement adaptive access rules to scale friction to risk, not to routine.
π Poll of the Week
Where does authentication create the most friction in your organization today?
π₯ Final Takeaway
Security that alienates users isnβt secure β itβs temporary.
As we move toward adaptive, AI-assisted access, the challenge isnβt choosing between safety and simplicity β itβs building systems that earn both.
The authentication paradox is real, but solvable.
If we design for humans, not just hackers, we can make security invisible β and invincible.
Stay ready. Stay resilient.
Until next time,
Meet Alex Rivera β Security Platform Engineer
Alex Rivera is a Security Platform Engineer with over ten years of experience building and securing cloud-native SaaS platforms. His work focuses on identity infrastructure, detection engineering, and hardening distributed systems at scale. Alex partners closely with product and DevOps teams to integrate security controls directly into development workflows, reducing risk without slowing delivery. Outside of work, he contributes to open-source security tooling, runs tabletop incident response exercises, and enjoys breaking β then fixing β his own lab environments.
