How do you know who someone really is? It can be hard to tell. How thorough you are might depend on context. That's what risk-based authentication does. In this video Jeff Crume talks about how a risk assessment might change how your cybersecurity handles different requests to keep your IT estate secure.