Hackers attack computer systems to steal information. Some of the most important types of information they can steal are access credentials like usernames/passwords or PINs.
Why is credential ac...
In authentication security, passwords are often the weak link, susceptible to several attacks.
What is password cracking? Password cracking is the use of different attacks to guess or expose a p...
What Is Password Cracking?
What Is a Password Guessing Attack?
Hackers never rest, and this truth is nowhere more apparent than in the world of password security.
What is a password guessing attack? A password guessing a...
What Is a Password Guessing Attack?
Twitter is giving SMS-based two-factor authentication (2FA) the bird for all but its paid subscribers. But there's a simpler way to secure Twitter accounts without ruffling anyone's feathers.
In...
Twitter Ending SMS-based 2FA for Free Users –But Here’s a Better Way to Save $60 Million
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos Chief Strategy Officer, Mike Engle, to discuss how to deliver the privacy, security and convenience people have come to expect online...
5 Ways to Modernize Customer Onboarding and Defeat Account Takeover
It appears "Wednesday" fans can Netflix and chill about the streaming giant's looming password sharing lockdown—at least for a little while. But when it does take effect, the policy could still sen...
Netflix’s Password Sharing Crackdown Could Be So Much Easier
On February 8, Privacy by Design (PbD) officially became an international privacy standard—but the architecture you use to operationalize its principles may matter as much as the standard itself.
...
Architecture is Everything as ‘Privacy by Design’ Becomes an ISO Standard
Modern hacks are getting more and more sophisticated, and this reality includes the rise of advanced phishing attacks.
Why are adversary-in-the-middle attacks dangerous? They are phishing attack...
What is an Adversary-In-The-Middle (AiTM) Phishing Attack?
While phishing and network attacks are still the most common hacks around, old-fashioned system hacking is still a threat to enterprises.
What is credential dumping? It is when a hacker uses exp...
What Is Credential Dumping & How To Prevent It?
Enabling biometrics with FIDO can help create more security for your logins and reduces the risk of login attacks from succeeding.
What is FIDO biometrics? FIDO biometrics are a way to authentic...
How To Use Biometrics with FIDO
Cyber threats are becoming increasingly sophisticated with the number of bad actors involved increasing at an alarming rate. New and sophisticated techniques are being used that have evolved over t...
Digital Transformation of Personnel Onboarding
There is a classic juxtaposition within security controls. Organizations need to make data and services available, but if it’s too easily accessible, too open, then a data breach can occur. On the ...
Zero Trust and User Experience
Problems with Passwords
Are passwords the weakest link in cybersecurity? We all know that it is risky to authenticate workers, citizens, and customers with passwords. The proof is in the seemingly...
3 Key Considerations in Your Passwordless Journey
What is Blockchain Verification & Validation?
Modern network infrastructure is turning towards decentralized models of record keeping. Authentication and identity management are no different.
...
What is Blockchain Verification & Validation?
Modern identity management relies on multi-factor authentication to maintain account security above and beyond simple passwords. One-Time Passwords (OTPs) are a vital part of this effort.
What a...
What Is a Time-Based One-Time Password (TOTP)?
It's 2023—do you know what your identity is doing? As the adoption of digital channels continues to be matched by corresponding levels of fraud, the ability to achieve digital identity verification...
6 Digital Identity Predictions for 2023
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos Director of Solutions Engineering, Jay Baskar, to discuss how to deploy passwordless authentication across a diverse IT environment. ...
How to Deploy Passwordless Authentication Across a Diverse IT Environment
With the EU becoming a major economic player, its rules and regulations are being felt around the business world.
What is GDPR? GDPR is a set of regulations specific to businesses in the EU gove...
7 Core Principles for GDPR Data Protection
Online, always-on finance and banking have led to significant security challenges for institutions trying to thwart international terrorism, identity theft, and fraud.
What are KYC regulations? ...
What Is KYC (Know Your Customer) For Banking?
Modern cyber threats require dynamic and evolving security countermeasures, especially regarding authentication.
What is adaptive authentication? It is a dynamic, risk-based approach to authenti...
What is Adaptive Authentication and Authorization?
Modern threats are evolving rapidly in both scope and scale. Hackers are targeting governments and businesses alike with increasing sophistication.
What is an APT? It’s a complex, long-term atta...
What Is An Advanced Persistent Threat (APT)?
Modern authentication has involved the use of biometric data for years. However, maintaining privacy without sacrificing security has remained a challenge.
What is biometric encryption? Biometri...
What is Biometric Encryption?
Biometrics have come a long way, but the humble fingerprint scan still provides excellent security for enterprise systems.
What is Fingerprint Authentication? It uses the unique characteristics ...
How Fingerprint Biometric Authentication Works
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos CSO, Mike Engle, to discuss how digital identity can modernize healthcare. If you are interested in learning more about this topic, p...