What if the key to your hotel room was suddenly useless, and your personal information was floating in the digital ether? This happened after the recent MGM Resorts cyberattack; the vulnerabilities...
Unmasking the MGM Resorts Cyber Attack: Why Identity-Based Authentication is the Future
Discover how 1Kosmos enhances Microsoft Entra ID with seamless identity-based authentication and passwordless access. Learn about new external authentication methods and how they empower organizati...
Vlog: How 1Kosmos Can Be An External Authentication Method When Using Microsoft Entra ID?
In an era where identity theft and fraud are rampant, understanding the complexities of customer identity verification is crucial for businesses, especially in the financial sector. This involves m...
Navigating the Complexities of Modern Customer Identity Verification
In a hybrid world that blends on-premises and cloud-based resources, securing access to sensitive data and systems is no longer achieved by defending a perimeter, but through authentication. While ...
Four Ways to Align Authentication with Business Needs
How secure are you in a world where data breaches and cyber-attacks make headlines daily? You might think you're doing enough if you've already upgraded to Two-Factor Authentication (2FA). However,...
What Is 3FA (Three-Factor Authentication)?
Join Robert MacDonald, VP of Product Marketing at 1Kosmos, and Vikram Subramanian, VP of Solutions, as they explore the integration of 1Kosmos with Microsoft Entra, enabling passwordless authentica...
Vlog: Why 1Kosmos and Microsoft Entra Are Better Together
Introduction
Traditional identity verification methods show their age, often proving susceptible to data breaches and inefficiencies. Blockchain emerges as a beacon of hope in this scenario, heral...
Blockchain Identity Management: A Complete Guide
Recently, the cybersecurity world was rocked by another significant breach, this time involving Snowflake, a major player in the data storage and analysis industry. The breach, orchestrated by the ...
Understanding the Snowflake Data Breach and Its Implications
Are you still relying on traditional passwords to authenticate users, even while cyber threats grow more sophisticated today? This article will examine passkey authentication work, a modern digital...
What are Passkeys and How Do They Work?
In the ever-evolving landscape of cybersecurity, Multi-Factor Authentication (MFA) stands as a critical defense mechanism. Gartner's recent report, "Seven Tracks to a Mature MFA Implementation," wr...
Navigating Gartner's Seven Tracks to MFA Maturity with 1Kosmos
The team here at 1Kosmos is excited to announce the release of 1Kosmos 1Key, a phishing-resistant biometric security key that supports authentication for unlimited users per device. The 1Key reduce...
Unlocking the Future of Secure Authentication for Shared Workstations with 1Kosmos 1Key
As a leading provider of identity management solutions, 1Kosmos is excited to announce our new capability as a Credential Service Provider (CSP) for government agencies. This development represents...
Elevating Government Digital Transformation with an Advanced Credential Service Provider - 1Kosmos
The recent ransomware attack on Change Healthcare, a major healthcare technology company, has once again highlighted the critical importance of robust identity verification and authentication measu...
The Recent Change Healthcare Ransomware Attack: Lessons Learned and How to Prevent Similar Breaches
Traditional identity verification methods show their age, often proving susceptible to data breaches and inefficiencies. Blockchain emerges as a beacon of hope in this scenario, heralding a new era...
Blockchain Identity Management: A Complete Guide
As society becomes more reliant on technology, the protection of confidential data increases. One innovative way organizations are keeping information safe is through fingerprint biometrics. In thi...
Behind Fingerprint Biometrics: How It Works and Why It Matters
Discover the simplicity and security of magic link authentication in this article. We dive into how magic links work, providing a hassle-free and secure alternative to traditional passwords. By exp...
Magic Links Demystified: Simplifying and Securing User Logins
Ensuring the safety of sensitive data and privacy shifts from just a priority to an absolute necessity. Authentication, the gatekeeper of these digital resources, is crucial in this fight against c...
Understanding Step Up Authentication: From Basics to Benefits
Identity and Access Management (IAM) is crucial in managing and authenticating users and securing access to organizational resources. IAM involves identifying users in a system and controlling thei...
The Truth About Passwordless IAM Authentication
Biometric spoofing, also known as biometric spoof attacks or biometric presentation attacks, refers to the manipulation or falsification of biometric data to deceive a biometric authentication syst...
Combatting Biometric Spoofing
Recent reports from the FBI have shed light on the escalating cyber espionage activities orchestrated by state-sponsored actors, particularly those emanating from China. Case in point -- the emerge...
Strengthening Cybersecurity in the Face of Rising Threats
Less than a month into 2024 and password spraying is being named as the origin for our first eye-opening cyber-attack. In a blog post, Microsoft has identified Midnight Blizzard, the Russian state-...
Mitigating Midnight Blizzard's Password Spraying Cyber Attack: Insights and Solutions by 1Kosmos
Multi-factor authentication (MFA) has emerged as a pivotal tool in cybersecurity, a security key to bolstering the fortifications guarding sensitive information and systems. Essential to comprehend...
What is MFA Fatigue and How Can Your Business Combat it?
What is FIDO Passwordless Authentication?
Fast Identity Online (FIDO) is an advanced security protocol that seeks to eliminate the need for passwords, moving towards a more secure and user-friendl...
Unleashing the Power of FIDO Passwordless Authentication with 1Kosmos BlockID
Have you ever wondered how a small piece of plastic could be your key to enhanced security and operational efficiency? This article dives into the intricacies of smart card technology, a robust sol...
Understanding Smart Card Authentication
Businesses face an ever-expanding array of cyber threats. Phishing, the deceptive practice of tricking individuals into divulging sensitive information, sits prominently at the top. It's not just a...
What Is Phishing Resistant MFA and How Can You Implement It?
I am very excited to announce that 1Kosmos is an official AWS Cognito Passwordless MFA partner.
Amazon Cognito places the utmost importance on online account security. To bolster the protection ...
Bringing 1Kosmos Passwordless Security to AWS Cognito
PCI DSS version 4.0 is the latest iteration of the Payment Card Industry Data Security Standard, released on March 31, 2022, and is currently in effect. The previous version, PCI DSS version 3.2.1,...
Are You Ready for PCI DSS Version 4.0?
Demands by residents for contactless services have accelerated the need for digital government services, but rampant identity fraud is impeding digital transformation and costing taxpayers millions...
Securing Digital Government Services with Credential Service Providers
Identity Governance is a beacon for organizations aiming to maintain regulatory compliance, safeguard operations and boost efficiency. Let's demystify this term: Identity Governance, tailored for o...
Identity Governance for Organizations: A Step-by-Step Guide to Implementation and Best Practices
A new method for controlling and confirming digital identities is emerging: distributed digital identity (DDI). By removing the need for a single authoritative source, DDI empowers users to take ch...
Distributed Digital Identity: A Transformative Guide for Organizations
In the ever-evolving landscape of cybersecurity, it's crucial to stay up to date with the latest innovations and technologies designed to enhance online security. One such innovation that has gaine...
Demystifying Passkeys: A Future of Passwordless Authentication
Introduction
Traditional password-based authentication techniques are vulnerable to online attacks. Fortunately, a ground-breaking remedy called an identity-based passwordless authentication syste...
Defending Your Online Presence: Identity-Based Passwordless Authentication
Introduction
Have you ever considered how identity verification is handled? Do not look other than eKYC. The complexity of eKYC will be unlocked with this article. Join us as we dive deep into thi...
Understanding eKYC: An In-Depth Overview
In this vlog, 1Kosmos VP of Product Marketing, Robert MacDonald, is joined by the VP of Solutions, Vikram Subramanian to discuss inserting identity into your SSO implementation.
Robert Mac...
Inserting Identity into Your SSO Implementation
With the rise of two-factor authentication and age verification, we're arming businesses with advanced tools to shield privacy and build confidence. This article will explore the evolution of custo...
From Traditional to Revolutionary: The Evolution of Customer Verification Methods
Introduction
Businesses today are at a crossroads of limitless prospects and invisible obstacles like fraud and money laundering as they navigate the exciting but treacherous seas of digital innov...
Know Your Business: The Practical Guide to KYB Checks
Symmetric encryption (or “private key” encryption) is the process of using a single key to both encrypt and decrypt data. It’s called “private key” because the use of a single encryption key necess...
What Is Symmetric Encryption, How Does It Work & Why Use It?
"Identity fabric" isn't a solution in and of itself, but rather represents a comprehensive and holistic approach to managing digital identities and security. This approach prioritizes flexible, sca...
What Is an Identity Fabric? (The Next Evolution of IAM?)
Identity-related security is paramount in our modern threat landscape, touching on almost any form of vulnerability related to cybersecurity.
What Is Identity Lifecycle Management? Identity Life...
Identity Lifecycle Management (ILM) Explained
Account takeover prevention actively reduces attack surfaces by which hackers can break into and use system accounts for malicious purposes.
What Is an Account Takeover Attack?
Account takeover (...
What Is Account Takeover Prevention? Preventing ATO Fraud
LinkedIn has joined the ranks of social media platforms offering ID verification badges designed to assure users that the person associated with a profile is in fact who they claim to be. Given org...
LinkedIn's ID Verification – One Small Step in the Right Direction
Earlier this month, Verizon released its Data Breach Investigations Report (DBIR). In this 16th year of the report, Verizon highlighted their analysis of more than 953,894 incidents, of which 254,9...
Verizon Data Breach Investigations Report 2023
https://player.vimeo.com/video/825146474
Huzefa Olia:
Good morning, Robert. How are you?
Robert MacDonald:
I'm good Huzefa. How are you this morning?
Huzefa Olia:
Wonderful. I'm so exci...
European Identity and Cloud Conference 2023
The increasing prevalence of financial crimes, such as money laundering, terrorist financing, and fraud, has led to stringent regulatory measures designed to protect consumers. These include using ...
What Is Enhanced Due Diligence? When Is It Needed?
Authentication is a crucial part of any web application, as it verifies the identity of the user and controls access to protected resources. One popular authentication method is JSON Web Token (JWT...
What Is JWT Authentication? How Does It Work?
In this vlog, 1Kosmos VP of Product Marketing, Robert MacDonald, is joined by our VP of Product Management, Javed Shah, and our Marketing Manager, Abigail Edwards, to discuss their experience at Ga...
Gartner IAM Summit
How we prove our identity has undergone revolutionary changes in a world of information. At the center of this transformation is Biometric Authentication. In essence, biometric authentication verif...
Biometric Authentication: A Comprehensive Overview
User account access is a foundational form of cybersecurity, addressing both internal and external threats.
How does Privileged Access Management (PAM) aid security? PAM centralizes privileged d...
What Is Privileged Access Management(PAM)? How It Works
Hackers attack computer systems to steal information. Some of the most important types of information they can steal are access credentials like usernames/passwords or PINs.
Why is credential ac...
What Is Credential Access?
What Is a Password Guessing Attack?
Hackers never rest, and this truth is nowhere more apparent than in the world of password security.
What is a password guessing attack? A password guessing a...
What Is a Password Guessing Attack?
Twitter is giving SMS-based two-factor authentication (2FA) the bird for all but its paid subscribers. But there's a simpler way to secure Twitter accounts without ruffling anyone's feathers.
In...
Twitter Ending SMS-based 2FA for Free Users –But Here's a Better Way to Save $60 Million
It appears "Wednesday" fans can Netflix and chill about the streaming giant's looming password sharing lockdown—at least for a little while. But when it does take effect, the policy could still sen...
Netflix's Password Sharing Crackdown Could Be So Much Easier
While phishing and network attacks are still the most common hacks around, old-fashioned system hacking is still a threat to enterprises.
What is credential dumping? It is when a hacker uses exp...
What Is Credential Dumping & How To Prevent It?
Enabling biometrics with FIDO can help create more security for your logins and reduces the risk of login attacks from succeeding.
What is FIDO biometrics? FIDO biometrics are a way to authentic...
How To Use Biometrics with FIDO
There is a classic juxtaposition within security controls. Organizations need to make data and services available, but if it’s too easily accessible, too open, then a data breach can occur. On the ...
Zero Trust and User Experience
Modern threats are evolving rapidly in both scope and scale. Hackers are targeting governments and businesses alike with increasing sophistication.
What is an APT? It’s a complex, long-term atta...
What Is An Advanced Persistent Threat (APT)?
Modern authentication has involved the use of biometric data for years. However, maintaining privacy without sacrificing security has remained a challenge.
What is biometric encryption? Biometri...
What is Biometric Encryption?
Biometrics have come a long way, but the humble fingerprint scan still provides excellent security for enterprise systems.
What is Fingerprint Authentication? It uses the unique characteristics ...
How Fingerprint Biometric Authentication Works
Which type of phishing attack can cost your company millions? Understanding different attacks can help protect against them and could boost your bottom line.
What Are the Types of Phishing Attacks...
10 Common Types of Phishing Attacks With Examples
A SIM swapping scam can not only take over your phone but can also become detrimental to your financial health as scammers can steal bank logins or data.
What does SIM swapping do? SIM swapping ...
What Is SIM Swapping? How To Protect Against This Scam
In this vlog, our VP of Product Marketing, Robert MacDonald, sat down with our CMO, Michael Cichon to chat about his experience at the 2022 FIDO Authenticate conference. He also gives insights into...
Authenticate 2022: How Web 3.0 Will Reshape Authentication
SSO Protocols can be extremely helpful in your organization as it cuts down on time spent on logins, but how do you choose which protocol to use?
What is SSO? SSO stands for Single Sign-On (SSO)...
What Are Single Sign-On (SSO) Protocols?
While NIST's Cybersecurity Framework is probably the most well-known, there are other cybersecurity frameworks your organization should be aware of.
What is a cybersecurity framework? A cybersec...
Cybersecurity Framework & NIST: What You Need to Know
Contractor Fraud and the Rise of Remote Work
Many organizations require the use of contractors, known as third parties. Managing these non-employees through the HR system, the authoritative identi...
Stopping the Latest Scam in Remote Contractor Onboarding
Passwords are becoming a thing of the past with biometrics taking over. But what does this mean for security, and what types of biometrics can be used?
What are examples of biometrics? Some exam...
What Is Biometrics? Different Types of Biometrics Explained
It's been a very exciting summer for the team here at 1Kosmos. Analysts are taking notice! We are honored to be recognized as an overall leader in the KuppingerCole Leadership Compass Providers of ...
1Kosmos Recognized as a Leader in KuppingerCole Providers of Verified Identity 2022
We are excited to share that 1Kosmos has been mentioned in 5 recent Gartner® Hype Cycle™ reports:
Hype Cycle for Privacy 2022
Hype Cycle for Digital Government Services, 2022
Hype Cyc...
1Kosmos Mentioned in 5 Recent Gartner® Hype Cycle™ Reports
CEO fraud attacks can destroy a company's financial and reputational future but are there any ways to protect against these attacks?
What is CEO fraud? CEO fraud, also called executive or whale...
What is CEO Fraud? - Attacks & How to Prevent Them
I recently stumbled upon an article titled “Travelers Wants Out of Contract With Insured That Allegedly Misrepresented MFA Use” and I was immediately intrigued. Since I work at an organization that...
Cyber Insurance and MFA
Wondering about private vs. public blockchains? Do you need a permissioned blockchain, or is permissionless the way to go? We've covered everything you need to know.
What are the four types of b...
Private vs. Public Blockchain - Differences Explained
Is a decentralized web the way to go, and is it the future of the world wide web? Should your business be preparing for this transition to decentralization?
What does a decentralized internet me...
What Is the Decentralized Web (Web 3.0)?
Understanding the semantic web can be confusing, so we break it down to help guide you through its technologies, history, and importance to the future of the web.
Why is the semantic web importa...
What Is the Semantic Web? (Includes Examples)
With the web in a constant state of flux, it's important to differentiate between Web 2.0 and Web 3.0 and prepare for the next web installation.
What is a Web 3.0 website? Web 3.0 is powered by ...
Web 2.0 vs. Web 3.0: Differences Defined
Two of the leading identity technologies go head to head in our post: Okta and Auth0. Which one is better for your business? Keep reading to find out.
Does Okta now own Auth0? Yes, Auth0 is now ...
Okta vs. Auth0 Comparison: Which Is Best for Business Use?
Password attacks are becoming easier to achieve with most people having too many passwords to remember, leading them to use the same password over and over.
What is a password attack? Password a...
8 Worst Password Attack Types & How to Stop Them
Clone phishing is a dangerous attack that can easily make it into any of your employees' inboxes. So what can you do to protect against it?
What is clone phishing? Clone phishing is a type of ph...
What Are Clone Phishing, Spear Phishing & Whaling?
Today (June 28, 0222), the FBI issued a warning stating that scammers may be trying to score jobs at companies to access customer or financial data, corporate IT databases, and/or proprietary infor...
FBI Issues Warning - Deepfakes and Stolen PII Utilized to Apply for Remote Work Positions
SIM binding is growing in popularity due to the ease of use and the greater amount of security provided compared to PIN code verification.
What is SIM binding? SIM binding is a type of device bi...
What Is SIM binding? [How to Prevent Online Fraud]
The 2022 Verizon Data Breach report found that a staggering 82% of breaches this year were caused by the human element which encompasses errors, misuse, and social engineering. The report also foun...
How Does 1Kosmos Augment Zscaler?
SOC 2 compliance should be at the top of the list for all technology services, software-as-a-service organizations, and service providers managing or storing customer data in the cloud.
What is ...
What Is SOC 2 Compliance & Certification?
This week, Verizon released its DBIR report marking 15 years of the annual report. In the report, Verizon highlighted their analysis of more than 5,212 breaches and 23,896 security incidents to fin...
Verizon 2022 Data Breach Investigations Report
The road to zero trust can be bumpy for nearly any organization. While CISOs need to make data and services accessible to their users, they also need to protect the same data and services in order ...
How to Defeat a Zero Trust Architecture
In my last blog post, I started discussing the implications of identity verification and facial recognition where organizations didn’t consider components of a zero trust architecture. Specifically...
How to Reform the Delivery of Government Services via Internet Pt 2
The move to biometric authentication started as far back as 2004 when IBM introduced fingerprint readers. Biometrics went mainstream when Apple released TouchID on the iPhone in 2013.
Since then...
How to Reform the Delivery of Government Services via Internet Pt 1
Passwordless authentication is becoming a hot topic in the identity verification field as capabilities are becoming more and more sophisticated. To eliminate passwords the market has shifted to aut...
Why Device Level Biometrics Do Not Equate to Identity
Strong authentication can be the difference between hackers easily slipping into your network and stealing your data or being able to block them from the start.
What is strong authentication? St...
What Is Strong Authentication? (With Examples & Methods)
Self-sovereign identities are the future of digital identities. Putting the control back into the hands of the users allows for greater security everywhere.
What is self-sovereign identity? Self...
What Is Self-Sovereign Identity? (The Future of ID?)
Distributed digital identity, decentralized identity, blockchain, and distributed ledgers: what do they mean and how can they help keep my company secure?
What is a digital identity? A digital i...
What Is Distributed Identity? How Decentralized ID Works
Passwords are a problem… we all know it. It’s all over our website and countless others. Vendors are trying to help organizations to course correct to solve the problem. Microsoft’s Windows Hello f...
6 Technology Gaps to Consider When Implementing Windows Hello For Business
Phishing is costing companies billions of dollars but executive phishing can make these attacks more costly because of who the attackers are spoofing.
What is executive phishing? Executive phish...
What Is Executive Phishing? (How to Protect Against Whaling)
Online document verification has become a useful tool in the current environment of remote onboarding; it eliminates the need for in-person verification.
What is the document verification proces...
Online Document Verification: How Does It Work?
Biometrics may sound like a new type of technology, but it has actually been around for decades and for a good reason—biometrics are hard to hack.
Why are biometrics used for security? Biometric...
Using Biometrics in Security: Pros & Cons
In my last blog post, I started discussing the implications of identity verification and facial recognition where organizations didn’t consider components of a zero trust architecture. Specifically...
The Advantages and Implications of Using Facial Recognition for Identity Verification Pt 2
The move to biometric authentication started as far back as 2004 when IBM introduced fingerprint readers. Biometrics went mainstream when Apple released TouchID on the iPhone in 2013.
Since then...
The Advantages and Implications of Using Facial Recognition for Identity Verification
Yesterday (February 9, 2022) the FBI issued a warning to inform the American public and mobile carriers about the increasing threat of SIM (Subscriber Identity Module) swapping. In 2020, criminals ...
FBI SIM Swapping Warning Issued
In the physical world, proving identity is straightforward. First, you present your driver’s license or a physical identity card, which is compared to your likeness and verified. Then, you put your...
Who Is on the Other Side of Your Digital Connections?
Dealing with complexity
Issues with passwords are well documented and education institutions are not immune to the issues and risks that passwords inject. To compound the security issue, these ins...
Identity is Shaping the Modern Campus
Today is another exciting day for the team here at 1Kosmos. Today, we are proud to announce our partnership with Outseer, the leader in payment authentication and monitoring cybersecurity and risk ...
1Kosmos and RSA/Outseer Partnership Protects Against Account Takeover (ATO) Attacks and Account Enrollment Fraud
Transitioning From Password Based Authentication to Identity Based Authentication
Passwords really aren’t the problem. It’s anonymous users hiding behind compromised credentials that represent one...