As human beings, we have an innate desire to own what we create. Our identity is no different. In the physical world, a person who wants to prove their identity usually does so via a driver’s licen...
With the recent introduction of the SCA compliance requirements, authentication is becoming a key player in protecting against fraud and securing payments.
What is Strong Customer Authentication C...
Strong Customer Authentication Compliance
New hire fraud is a top concern for Chief Security Officers (CSOs) in most organizations. With the rise of remote work during the COVID-19 pandemic, these concerns have only been exacerbated. Many ...
Is Your New Employee Really Who They Say They Are?
Part 3
In parts 1 and 2 of this series I discussed the transition underway in the IAM industry to passwordless authentication and the reasons why 1Kosmos has taken the path to passwordless throu...
Identity Based Authentication: Conflux of ID & Authentication
Part 2
In part 1, I provided some needed context for moving from passwords to identity for user authentication. Now, let’s take a deeper look, and we’ll start with identity in the offline world....
Identity Based Authentication- Eliminating Passwords
Part 1
There seems to come a point in time when all industries hit an inflection point - where the old ways of doing things cede to the new.
We’ve reached this point in Identity and access ma...
Identity Based Authentication – The Transformation of IAM
Today we relaunched the 1Kosmos brand at a time when both business and government leaders are demanding improved security against cyber threats while international gangs feast on ransomware, data b...
1Kosmos Relaunch: How 1Kosmos Protects Identity from Attack
What is an Identity Verification System?
An identity verification systems is a type of software that ensures a person is who they claim to be; for businesses, user identities need to be verified t...
Identity Verification Systems Explained
Voice authentication makes logins as easy as speaking. This may sound futuristic, but it's the security that's saving businesses from breaches every day.
Is voice recognition secure? Yes, voice ...
Voice Authentication: How It Works & Is It Secure?
1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss onboarding, ID proofing, and strong customer authentication in this vlog.
Michael Cichon:
Let's welcome Mike Engle, Chief Strategy O...
Vlog: Onboarding, ID Proofing, Strong Customer Authentication
1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss a variety of topics including ransomware and executive orders in their recent vlog.
Michael Cichon:
Hey Mike. Quite a day, huh?
Mike...
Vlog: Pipelines, Executive Orders, and More with Mike Engle
The Old Way: Friction Filled Authentication
In today’s digital world, most of us face authentication problems on a daily basis. Whether your records were some of the 37 billion that were compromis...
Introducing the 1Kosmos Appless Feature
A random jumble of letters is a secure password, but will you remember it? Password management can secure your account without memorizing these long passwords.
What is Password Management?
Passwo...
Guide to Password Management for Employees
1Kosmos CTO, Rohan Pinto, and CMO, Michael Cichon, discuss appless authentication in this recent vlog.
Michael Cichon:
All right, welcome Rohan Pinto, chief technology officer at 1Kosmos. It's ...
Vlog: Appless Authentication
Biometric password: making you the password. Here’s how biometric logins are more secure and remove the need to memorize a password.
What is a biometrics login? A biometric login uses an individ...
Intro to Biometric Passwords
Identification is only one part of the detection process; add in authentication and you can strongly guarantee a user is who they truly claim to be.
How Does Identity Authentication Work?
Verifyi...
How Identity Authentication Works
Curious about passwordless authentication? Wondering how it can create a more secure login? We'll walk you through what it is and how it works in an enterprise.
Is passwordless authentication sa...
Guide to Passwordless Authentication
During this year’s RSA conference, 1Kosmos was named a Global InfoSec Awards winner in the Next-Gen in Blockchain Security category by Cyber Defense Magazine (CDM), the industry’s leading electroni...
1Kosmos Wins Global InfoSec Award During RSA Conference 2021
The Colonial Pipeline Attack: An Authentication Crisis
If you live on the east coast of the United States, you are probably still facing the consequences of the Colonial Pipeline Attack: scrambl...
Could CEOs Face Criminal Charges for Negligent Cybersecurity Standards?
Colonial Pipeline Attack: An Identity Management Nightmare
You’ve probably seen the latest authentication and identity management nightmare sweeping the US: the Colonial Pipeline attack. In case y...
VPN and Virtual Desktop Security: How Going Passwordless Could Have Prevented the Colonial Pipeline Attack
The Challenge of Identity Management
Identity management has been a challenge for individuals and organizations for years, especially in the digital world. One individual may have a different digi...
1Kosmos BlockID’s NIST 800-63-3 Conformant & FIDO2 Certification Enhances Security with Fully Proofed Users
An authentication and identity management nightmare...?
It’s been all over the news in the last twenty-four hours: An increasing number of gas stations on the East Coast are without fuel! About 15...
The Reality Behind the Colonial Pipeline Attack
Identity Management vs. Decentralized Identity
What exactly does identity management mean? Broadly, it is defined as tools that help companies manage the access rights of all of their employees....
How Can Decentralized Identity Help With Identity Management?
Passwordless Authentication Makes 1Kosmos the Most Advanced Startup
Passwordless authentication is one of the top features that led Alestra to call 1Kosmos the “most advanced startup” in their 5th...