The four types of authentication claimed by cyber security vendors are:
Traditionally cyber security has thought of only 3 authentication factors. Something that you know, you have, or you are. But as vendors have tried to find new ways of measuring "something you are" they have started to measure behaviour. Specifically how people use a mobile phone or computer.
This means that strong authentication can be used on more devices. It removes the need for fingerprint scanners or cameras for facial recognition. And allows more people to access to strong authentication.
But it doesn't change the foundation of the three factors of authentication: