Given the stunning success of the recent hacks at MGM and Caesars, it's a safe bet what happened in Vegas won't stay there for long. Even though technology to prevent such breaches is readily avail...
What if the key to your hotel room was suddenly useless, and your personal information was floating in the digital ether? This happened after the recent MGM Resorts cyberattack; the vulnerabilities...
Unmasking the MGM Resorts Cyber Attack: Why Identity-Based Authentication is the Future
Discover how 1Kosmos enhances Microsoft Entra ID with seamless identity-based authentication and passwordless access. Learn about new external authentication methods and how they empower organizati...
Vlog: How 1Kosmos Can Be An External Authentication Method When Using Microsoft Entra ID?
In today's fast-paced digital world, efficient and secure user onboarding is a crucial aspect of any organization's IT strategy. Imagine users maintaining countless account credentials to log in to...
Streamlining Self-Service User Onboarding with 1Kosmos MFA Integration
In a hybrid world that blends on-premises and cloud-based resources, securing access to sensitive data and systems is no longer achieved by defending a perimeter, but through authentication. While ...
Four Ways to Align Authentication with Business Needs
How secure are you in a world where data breaches and cyber-attacks make headlines daily? You might think you're doing enough if you've already upgraded to Two-Factor Authentication (2FA). However,...
What Is 3FA (Three-Factor Authentication)?
Join Robert MacDonald, VP of Product Marketing at 1Kosmos, and Vikram Subramanian, VP of Solutions, as they explore the integration of 1Kosmos with Microsoft Entra, enabling passwordless authentica...
Vlog: Why 1Kosmos and Microsoft Entra Are Better Together
Recently, the cybersecurity world was rocked by another significant breach, this time involving Snowflake, a major player in the data storage and analysis industry. The breach, orchestrated by the ...
Understanding the Snowflake Data Breach and Its Implications
Are you still relying on traditional passwords to authenticate users, even while cyber threats grow more sophisticated today? This article will examine passkey authentication work, a modern digital...
What are Passkeys and How Do They Work?
Join Michael Cichon, CMO, and Mike Engle, CSO of 1Kosmos, as they introduce 1Key, a groundbreaking biometric authentication solution. Learn how 1Key eliminates passwords and mobile devices, offerin...
Vlog: Introducing the 1Kosmos 1Key Biometric Security Key
In the ever-evolving landscape of cybersecurity, Multi-Factor Authentication (MFA) stands as a critical defense mechanism. Gartner's recent report, "Seven Tracks to a Mature MFA Implementation," wr...
Navigating Gartner’s Seven Tracks to MFA Maturity with 1Kosmos
The team here at 1Kosmos is excited to announce the release of 1Kosmos 1Key, a phishing-resistant biometric security key that supports authentication for unlimited users per device. The 1Key reduce...
Unlocking the Future of Secure Authentication for Shared Workstations with 1Kosmos 1Key
Watch our latest vlog for an insightful conversation between Michael Cichon, Chief Marketing Officer at 1Kosmos, and Siddharth Gandhi, Chief Operating Officer of the Asia Pacific region. In this vi...
Vlog: How the Reserve Bank of India Guidelines Align with 1Kosmos
The recent ransomware attack on Change Healthcare, a major healthcare technology company, has once again highlighted the critical importance of robust identity verification and authentication measu...
The Recent Change Healthcare Ransomware Attack: Lessons Learned and How to Prevent Similar Breaches
Discover the simplicity and security of magic link authentication in this article. We dive into how magic links work, providing a hassle-free and secure alternative to traditional passwords. By exp...
Magic Links Demystified: Simplifying and Securing User Logins
Ensuring the safety of sensitive data and privacy shifts from just a priority to an absolute necessity. Authentication, the gatekeeper of these digital resources, is crucial in this fight against c...
Understanding Step Up Authentication: From Basics to Benefits
Identity and Access Management (IAM) is crucial in managing and authenticating users and securing access to organizational resources. IAM involves identifying users in a system and controlling thei...
The Truth About Passwordless IAM Authentication
Recent reports from the FBI have shed light on the escalating cyber espionage activities orchestrated by state-sponsored actors, particularly those emanating from China. Case in point -- the emerge...
Strengthening Cybersecurity in the Face of Rising Threats
Join Rob MacDonald, VP of Product Marketing, and Huzefa Olia, COO of 1Kosmos, as they unveil the exciting integration news with Amazon Cognito. Learn about the significance of 1Kosmos becoming an A...
Vlog: 1Kosmos Adds Passwordless Authentication to Amazon Cognito
Multi-factor authentication (MFA) has emerged as a pivotal tool in cybersecurity, a security key to bolstering the fortifications guarding sensitive information and systems. Essential to comprehend...
What is MFA Fatigue and How Can Your Business Combat it?
What is FIDO Passwordless Authentication?
Fast Identity Online (FIDO) is an advanced security protocol that seeks to eliminate the need for passwords, moving towards a more secure and user-friendl...
Unleashing the Power of FIDO Passwordless Authentication with 1Kosmos BlockID
Have you ever wondered how a small piece of plastic could be your key to enhanced security and operational efficiency? This article dives into the intricacies of smart card technology, a robust sol...
Understanding Smart Card Authentication
Businesses face an ever-expanding array of cyber threats. Phishing, the deceptive practice of tricking individuals into divulging sensitive information, sits prominently at the top. It's not just a...
What Is Phishing Resistant MFA and How Can You Implement It?
I am very excited to announce that 1Kosmos is an official AWS Cognito Passwordless MFA partner.
Amazon Cognito places the utmost importance on online account security. To bolster the protection ...