I recently stumbled upon an article titled “Travelers Wants Out of Contract With Insured That Allegedly Misrepresented MFA Use” and I was immediately intrigued. Since I work at an organization that...
Two of the leading identity technologies go head to head in our post: Okta and Auth0. Which one is better for your business? Keep reading to find out.
Does Okta now own Auth0? Yes, Auth0 is now ...
Okta vs. Auth0 Comparison: Which Is Best for Business Use?
With hackers becoming increasingly better at cracking logins, what are good password alternatives to protect your account and increase network security?
What can be used instead of passwords?
...
Top 10 Password Alternatives (Is the Future Passwordless?)
Password attacks are becoming easier to achieve with most people having too many passwords to remember, leading them to use the same password over and over.
What is a password attack? Password a...
8 Worst Password Attack Types & How to Stop Them
Clone phishing is a dangerous attack that can easily make it into any of your employees' inboxes. So what can you do to protect against it?
What is clone phishing? Clone phishing is a type of ph...
What Are Clone Phishing, Spear Phishing & Whaling?
Today (June 28, 0222), the FBI issued a warning stating that scammers may be trying to score jobs at companies to access customer or financial data, corporate IT databases, and/or proprietary infor...
FBI Issues Warning – Deepfakes and Stolen PII Utilized to Apply for Remote Work Positions
SIM binding is growing in popularity due to the ease of use and the greater amount of security provided compared to PIN code verification.
What is SIM binding? SIM binding is a type of device bi...
What Is SIM binding? [How to Prevent Online Fraud]
The 2022 Verizon Data Breach report found that a staggering 82% of breaches this year were caused by the human element which encompasses errors, misuse, and social engineering. The report also foun...
How Does 1Kosmos Augment Zscaler?
The Way Things Used to Be
During the pandemic, life and work changed rapidly. Appointments needed to be conducted remotely, which resulted in some employees never even meeting each other in person...
Reflections from 1Kosmos All Hands Meeting in India
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon, to discuss FIDO's May 5th announcement and what it means for the future of pa...
Vlog: FIDO and the Future of Passwordless
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon to discuss how a zero trust architecture can be defeated. They also discuss ho...
Vlog: How to Defeat a Zero Trust Architecture
This week, Verizon released its DBIR report marking 15 years of the annual report. In the report, Verizon highlighted their analysis of more than 5,212 breaches and 23,896 security incidents to fin...
Verizon 2022 Data Breach Investigations Report
When great minds and visionary leaders come together, good things can happen. Better yet, when they come together with a shared interest to solve a challenge and bring along specialized teams with ...
AuthenticID and 1Kosmos: A Shared Vision to Unify Identity Proofing and Authentication
Strong authentication can be the difference between hackers easily slipping into your network and stealing your data or being able to block them from the start.
What is strong authentication? St...
What Is Strong Authentication? (With Examples & Methods)
In this vlog, our CSO, Michael Engle, joins our CMO, Michael Cichon, to discuss how to extend Windows Hello in your journey to passwordless.
https://player.vimeo.com/video/706161992
Michael C...
How to Extend Windows Hello in Your Journey to Passwordless
Passwords are a problem… we all know it. It’s all over our website and countless others. Vendors are trying to help organizations to course correct to solve the problem. Microsoft’s Windows Hello f...
6 Technology Gaps to Consider When Implementing Windows Hello For Business
Karla interviews Hemen Vimadalal, CEO at 1Kosmos and an investor in a number of cybersecurity businesses. Hemen talks about his experience with identity theft and how that has driven him to create ...
1Kosmos CEO Hemen Vimadalal Podcast Interview with Karla Reffold
Phishing is costing companies billions of dollars but executive phishing can make these attacks more costly because of who the attackers are spoofing.
What is executive phishing? Executive phish...
What Is Executive Phishing? (How to Protect Against Whaling)
Online document verification has become a useful tool in the current environment of remote onboarding; it eliminates the need for in-person verification.
What is the document verification proces...
Online Document Verification: How Does It Work?
Email phishing can be tricky to spot, cost your company thousands of dollars, and tarnish your reputation, so how can you protect against these attacks?
What Is Email Phishing?
Email phishing is ...
What Is Email Phishing? (& How to Prevent It)
A one-time password can be used for many authentication needs including securing private information or creating an alternative to a password reset.
What is a One-Time Password?
A one-time passwo...
What Is a One-Time Password & When Is It Used?
Whale phishing attacks can deplete an organization of millions and destroy reputations. Is your company protected from these attacks?
What is whale phishing? Whale phishing is a spear phishing a...
Whale Phishing: What Is a Whaling Attack?
FIDO2 authentication goes beyond simply being an extension of FIDO or the FIDO alliance and adds in new protocols for passwordless authentication.
What does FIDO2 stand for? FIDO2 stands for Fas...
FIDO2 Authentication vs. FIDO: What’s the Difference?
This week news broke about the strategic partnership between 1Kosmos and AuthenticID. This is an industry first that provides end-to-end strong identity proofing and authentication solutions for ci...