Behavioural Security Metrics and Illegitimate User Detection

Why behavioural security metrics like typing velocity matter when geofencing and zero trust assumptions fail.

This is a really interesting read and a genuinely innovative way of detecting illegitimate users on corporate devices.

Geofencing and heavily locked-down endpoints have limits — particularly when facing nation-state actors using proxy infrastructure, or supply-chain delivery of corporate laptops.

Without wishing to be dramatic, I think security professionals need to recognise that this is the environment we’re now operating in.

At that point, behavioural metrics like typing velocity begin to matter.

What should “normal” network behaviour look like?
What does the bulk of user activity look like?

  • Log on at 08:30, log off at 17:30.
  • Who stays online after that — and for how long?
  • Is that consistent with how they’ve worked historically?

Data transfer rates matter too. Kilobytes. Megabytes. Gigabytes. And occasionally… terabytes.

When the spike appears, does it fit the baseline at all.

Zero Trust has its own operating environment. Once that environment is breached, behavioural signals start to matter far more than controls.

Unknown's avatar

Author: Richard Petter

I am an information security consultant with over 25 years of experience helping organisations protect sensitive data and build secure networks. Over the years, I’ve worked with products and solutions from all major security vendors, giving me a broad understanding of how to defend against today’s evolving threats. My expertise covers securing data at rest and in transit, implementing advanced network security strategies, and advising on best practices for data protection. Right now, I’m particularly focused on how anomaly detection and threat monitoring can be integrated into security operations to provide earlier, smarter defences against attacks. Whether it’s strengthening resilience, improving compliance, or optimising security tools, I help businesses stay one step ahead in a constantly changing digital landscape

Leave a comment