Gibran Kazi, Co-Founder and CEO, Erasys discusses why the future of zero trust depends on continuous authentication powered by privacy-preserving, hardware-optimised AI at the edge rather than centralised cloud models.
For the past decade, the cybersecurity industry has operated on a perilous assumption: That a user who logs in successfully at 9 AM is the same user typing on the keyboard at 11 AM.
We have spent billions fortifying the front door. We have implemented Multi-Factor Authentication (MFA), deployed rigid IAM policies and mandated complex passwords.
Yet, according to the Verizon Data Breach Investigations Report (DBIR), over 80% of hacking-related breaches still involve compromised credentials.
In 2026, the threat landscape has shifted. Attackers are no longer just trying to break in; they are hijacking valid sessions.
The commoditisation of Generative AI has armed threat actors with tools to automate session hijacking, bypass biometric checks via deepfakes and mimic user activity to evade heuristic detection.
The industry consensus is clear: We must move from ‘authorised access’ to ‘authorised presence’.
However, the implementation of this shift faces a massive hurdle: The privacy paradox.
To achieve ‘authorised presence,’ security teams theoretically need to monitor everything a user does.
Historically, this required streaming granular user telemetry to a cloud analytics engine.
This approach creates significant friction:
This creates a deadlock. The CISO needs visibility to stop the breach, but the DPO Data Protection Officer (DPO) demands privacy to meet compliance.
Critical analysis of current market solutions reveals that software-only approaches are insufficient. They are too heavy for the endpoint or too invasive for the user. To solve this, we must look below the operating system – to the silicon itself.
The solution to the privacy paradox lies in a fundamental architectural shift: Moving the intelligence – and the learning process – from the cloud to the device.
This concept, often termed ‘sovereign AI at the edge,’ represents the next phase of zero trust.
Instead of exporting sensitive user data to train models centrally, we allow the security model to live and learn locally on the endpoint.
This approach is now viable due to the widespread adoption of Neural Processing Units (NPU) in modern business hardware, such as the Intel Core Ultra architecture.
By offloading the learning loop to the NPU, the system can continuously adapt to a user’s changing behaviour without impacting system performance.
A best-practice architecture for this ‘invisible security’ relies on three functional pillars:
By combining advanced biometric software with NPU acceleration, we achieve the holy grail of enterprise security: Continuous, passive verification.
As AI tools lower the barrier to entry for cybercriminals, the ‘verify once, trust for hours’ model is no longer tenable.
By leveraging the power of Edge AI and local compute optimisation, we can build a security perimeter that is omnipresent yet invisible – securing the human element without compromising the human experience.
This article was originally published in the February edition of Security Journal UK. To read your FREE digital edition, click here.