It appears "Wednesday" fans can Netflix and chill about the streaming giant's looming password sharing lockdown—at least for a little while. But when it does take effect, the policy could still sen...
Modern hacks are getting more and more sophisticated, and this reality includes the rise of advanced phishing attacks.
Why are adversary-in-the-middle attacks dangerous? They are phishing attack...
What is an Adversary-In-The-Middle (AiTM) Phishing Attack?
There is a classic juxtaposition within security controls. Organizations need to make data and services available, but if it’s too easily accessible, too open, then a data breach can occur. On the ...
Zero Trust and User Experience
Problems with Passwords
Are passwords the weakest link in cybersecurity? We all know that it is risky to authenticate workers, citizens, and customers with passwords. The proof is in the seemingly...
3 Key Considerations in Your Passwordless Journey
Modern identity management relies on multi-factor authentication to maintain account security above and beyond simple passwords. One-Time Passwords (OTPs) are a vital part of this effort.
What a...
What Is a Time-Based One-Time Password (TOTP)?
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos Director of Solutions Engineering, Jay Baskar, to discuss how to deploy passwordless authentication across a diverse IT environment. ...
How to Deploy Passwordless Authentication Across a Diverse IT Environment
Modern cyber threats require dynamic and evolving security countermeasures, especially regarding authentication.
What is adaptive authentication? It is a dynamic, risk-based approach to authenti...
What is Adaptive Authentication and Authorization?
Modern threats are evolving rapidly in both scope and scale. Hackers are targeting governments and businesses alike with increasing sophistication.
What is an APT? It’s a complex, long-term atta...
What Is An Advanced Persistent Threat (APT)?
Authentication is a constant challenge for enterprise organizations managing teams accessing system resources from anywhere, at any time. New technologies are leveraging mobile devices to address t...
What Is Push Authentication (2FA)?
Which type of phishing attack can cost your company millions? Understanding different attacks can help protect against them and could boost your bottom line.
What Are the Types of Phishing Attacks...
10 Common Types of Phishing Attacks With Examples
SAML and SSO work together to create a more accessible and more secure login for users. But how, exactly, do these methods work?
What is SAML SSO? SAML is an overarching standard that includes s...
What is SAML & How Does SSO Authentication Work?
In this vlog, our VP of Product Marketing, Robert MacDonald, sat down with our CMO, Michael Cichon to chat about his experience at the 2022 FIDO Authenticate conference. He also gives insights into...
Authenticate 2022: How Web 3.0 Will Reshape Authentication
SAML SSO vs. LDAP can be challenging to parse out. Still, we go through both methods to help clear up the differences and help you decide which to use.
Is SSO possible with LDAP? Yes, SSO is pos...
SAML SSO vs LDAP: Differences & Definitions Explained
While zero trust implementation can advance your security, you may want to know of the best practices to really get the most out of your zero trust framework.
What are the main concepts of zero ...
5 Zero Trust Best Practices for Implementation
SSO Protocols can be extremely helpful in your organization as it cuts down on time spent on logins, but how do you choose which protocol to use?
What is SSO? SSO stands for Single Sign-On (SSO)...
What Are Single Sign-On (SSO) Protocols?
OIDC vs. SAML: What's the Difference?
Security Assertion Markup Language (SAML) vs. OpenID Connect (OIDC): It can be challenging to choose between the two and decide which is best for business.
...
OIDC vs SAML: What’s the Difference?
What is passport scanning? Is there a convenient way to securely scan passports remotely? Our CSO, Mike Engle, joins our CMO, Michael Cichon, to answer these questions and more in their recent vlog...
Is There a Secure Way to Scan Passports Remotely?
As an information security standard, ISO 27001 can be beneficial to understand and comply with, but what exactly is ISO 27001?
What does ISO 27001 mean? ISO 27001 is a regulation for Information...
What is ISO 27001: Information Security Standard?
Looking to implement zero trust in your organization but don't know where to start? Keep reading to find the best way to get a zero-trust model up and running.
What is zero trust? Zero trust is ...
How to Implement a Zero Trust Security Model
As the teenager taking credit for last week's Uber hack so ably demonstrated, threat actors have found an unlikely accomplice in multifactor authentication. But how did cyberattackers manipulate MF...
Uber Hack: MFA Can’t Fix the Problem Until We Fix MFA
1Kosmos had the pleasure of attending the Gartner IAM Summit 2022 in Las Vegas. It was our first time exhibiting and sponsoring the event. I have to say it was great to see long time friends, forme...
Gartner IAM Thoughts and Observations
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos COO, Huzefa Olia, discuss best practices for fixing multifactor authentication.
https://player.vimeo.com/video/745520635
Michael Cicho...
Vlog: MFA Tried to Fix Passwords but How do we Fix MFA?
CEO fraud attacks can destroy a company's financial and reputational future but are there any ways to protect against these attacks?
What is CEO fraud? CEO fraud, also called executive or whale...
What is CEO Fraud? – Attacks & How to Prevent Them
Strong Customer Authentication works to protect European users when accessing sensitive financial information, but your company may also need it for compliance.
What is strong customer authentic...