What is an Identity Verification System?
An identity verification systems is a type of software that ensures a person is who they claim to be; for businesses, user identities need to be verified t...
1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss onboarding, ID proofing, and strong customer authentication in this vlog.
Michael Cichon:
Let's welcome Mike Engle, Chief Strategy O...
Vlog: Onboarding, ID Proofing, Strong Customer Authentication
The Old Way: Friction Filled Authentication
In today’s digital world, most of us face authentication problems on a daily basis. Whether your records were some of the 37 billion that were compromis...
Introducing the 1Kosmos Appless Feature
A random jumble of letters is a secure password, but will you remember it? Password management can secure your account without memorizing these long passwords.
What is Password Management?
Passwo...
Guide to Password Management for Employees
1Kosmos CTO, Rohan Pinto, and CMO, Michael Cichon, discuss appless authentication in this recent vlog.
Michael Cichon:
All right, welcome Rohan Pinto, chief technology officer at 1Kosmos. It's ...
Vlog: Appless Authentication
Identification is only one part of the detection process; add in authentication and you can strongly guarantee a user is who they truly claim to be.
How Does Identity Authentication Work?
Verifyi...
How Identity Authentication Works
Curious about passwordless authentication? Wondering how it can create a more secure login? We'll walk you through what it is and how it works in an enterprise.
Is passwordless authentication sa...
Guide to Passwordless Authentication
During this year’s RSA conference, 1Kosmos was named a Global InfoSec Awards winner in the Next-Gen in Blockchain Security category by Cyber Defense Magazine (CDM), the industry’s leading electroni...
1Kosmos Wins Global InfoSec Award During RSA Conference 2021
The Colonial Pipeline Attack: An Authentication Crisis
If you live on the east coast of the United States, you are probably still facing the consequences of the Colonial Pipeline Attack: scrambl...
Could CEOs Face Criminal Charges for Negligent Cybersecurity Standards?
Passwordless Authentication Makes 1Kosmos the Most Advanced Startup
Passwordless authentication is one of the top features that led Alestra to call 1Kosmos the “most advanced startup” in their 5th...
1Kosmos Is Selected for the Alestra NAVE Program
What is the most important piece of information to know when you are securing a financial transaction, launching a nuclear weapon, or simply onboarding a new employee? The answer is that you absolu...
Why Is Authentication Important?
Passwords have been used to access computers since 1961 when an operating system at the Massachusetts Institute of Technology first required login credentials. 60 years later, despite the massive a...
The Benefits of Passwordless Authentication
Zero Trust is a buzzword with which cybersecurity folks are quite familiar. I understand, you’re surprised. Zero Trust has nothing to do with the Amazon packages your spouse hides from you. Rather,...
Zero Trust: Don’t Believe the Hyp(r)e!
Long before the COVID-19 pandemic, employees used their work devices to check their social or news notifications while on break. Now, the lines between personal and work uses are even more blurred ...
About Gartner’s 5 Key Predictions for IAM and Fraud Detection
Still today, the number one security problem pertains to identity and passwords.
More than 80 percent of data breaches that have occurred in the last ten years involve brute-force or the utilizati...
About Gartner’s Top Security Projects for 2021
Phishing, smishing, vishing... Outside of haunting CISOs day and night, what’s the difference? Well, phishing can be considered the parent of them all. It involves sending targeted email messages t...
The Bulletproof Solution to Prevent Vishing Attacks
Reality has just caught up with us. The new COVID-19 variants (there seems to be a new one every week since the beginning of the year) is spreading around the world at a worrisome pace. Most wester...
Remote Access Challenges and The Solution
It’s already mid-January and Google has been filled with references to web pages ranking what is supposedly the best to come in 2021 for a multitude of things. Spoiler alert: this blog isn’t about ...
2021 Top-5 Cyber Security Priorities
We’ve all been exposed to social logins. Social logins allow users like you and me to access websites or create accounts on websites by using existing social account credentials that we’ve already ...
Social Logins: The Other Side of The Coin
As much as Bud Fox, under the alias “Blue Horseshoe,” shared his love for Anacott Steel on the phone with a Wall Street reporter with the hope of manipulating the markets, there is one industry tha...
When Fintech and Cyber Attacks Walk Hand in Hand
A second wave of COVID-19 has started to wash across Europe and the United States. So, who knows when there is going to be a return to normality? For the past several months, many organizations hav...
VPN and Virtual Desktop Security Debunked
Employees face a challenge daily, actually multiple times per day, having to access multiple systems and applications throughout the day to do their job. They have to unlock their Windows desktop, ...
Workforce Authentication Challenges and Best Practices
Employees face a challenge on a daily basis, and this challenge consists of having to access multiple systems and applications throughout the day, like unlocking a Windows desktop, logging into int...
Audio Blog: Challenges of Password Management and Best Practices
First we need to see what is mnemonics? It is a system such as a pattern of letters, ideas, or associations which assists in remembering something. A mnemonic private key is a memory technique util...