What is fingerprint verification? Fingerprint verification uses a fingerprint scan to identify and verify that a user is who they say they are. Fingerprint authentication is the most popular way to...
As the teenager taking credit for last week's Uber hack so ably demonstrated, threat actors have found an unlikely accomplice in multifactor authentication. But how did cyberattackers manipulate MF...
Uber Hack: MFA Can’t Fix the Problem Until We Fix MFA
Here at 1Kosmos, It’s been an action-packed September full of events, analyst mentions, awards and more. One of these exciting events was an Innovation Festival in the Philippines hosted by our cus...
Reflections from UnionDigital Innovation Festival
Why Implement Biometric MFA?
We are all aware of the risks associated with password-based authentication. The proof is in the seemingly endless list of password-based breaches that we see in the n...
Biometric Based MFA for Zero Trust
It's been a very exciting summer for the team here at 1Kosmos. Analysts are taking notice! We are honored to be recognized as an overall leader in the KuppingerCole Leadership Compass Providers of ...
1Kosmos Recognized as a Leader in KuppingerCole Providers of Verified Identity 2022
1Kosmos had the pleasure of attending the Gartner IAM Summit 2022 in Las Vegas. It was our first time exhibiting and sponsoring the event. I have to say it was great to see long time friends, forme...
Gartner IAM Thoughts and Observations
Recently, I came across an article titled “No easy fix for ID verification for government benefits” that explored a major challenge that governments have been facing for the past few years. This pr...
Is There Really No Easy Fix for ID Verification for Government Benefits?
We are excited to share that 1Kosmos has been mentioned in 5 recent Gartner® Hype Cycle™ reports:
Hype Cycle for Privacy 2022
Hype Cycle for Digital Government Services, 2022
Hype Cyc...
1Kosmos Mentioned in 5 Recent Gartner® Hype Cycle™ Reports
Synthetic identities can easily be mistaken for real identities and can wreak havoc on companies that fall victim. So how can you differentiate between the two?
What is synthetic identity theft?...
What Is Synthetic Identity Theft? New Path For Fraud?
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos COO, Huzefa Olia, discuss best practices for fixing multifactor authentication.
https://player.vimeo.com/video/745520635
Michael Cicho...
Vlog: MFA Tried to Fix Passwords but How do we Fix MFA?
CEO fraud attacks can destroy a company's financial and reputational future but are there any ways to protect against these attacks?
What is CEO fraud? CEO fraud, also called executive or whale...
What is CEO Fraud? – Attacks & How to Prevent Them
Access control is a security measure that can prevent unauthorized access to sensitive information. But how can mandatory access control help with security?
What is mandatory access control? Man...
What Is Mandatory Access Control (MAC)?
Strong Customer Authentication works to protect European users when accessing sensitive financial information, but your company may also need it for compliance.
What is strong customer authentic...
What is Strong Customer Authentication (SCA) & PSD2?
In this vlog, our Chief Operating Officer, Huzefa Olia, joins our Chief Marketing Officer, Michael Cichon, to discuss why Okta needs an identity layer.
https://player.vimeo.com/video/740777974
...
Vlog: Why Okta Needs an Identity Layer
Driver’s licenses were one of the top three most breached data attributes in 2021, according to the Identity Theft Resource Center (ITRC). To make matters worse, many driver’s licenses are counterf...
Achieve a Higher Level of Identity Assurance with BlockID’s AAMVA Integration
I recently stumbled upon an article titled “Travelers Wants Out of Contract With Insured That Allegedly Misrepresented MFA Use” and I was immediately intrigued. Since I work at an organization that...
Cyber Insurance and MFA
CIP and KYC are vital procedures and guidelines to help keep customer data secure while also verifying a customer's identity.
What is KYC CIP? Know your customer and customer identification proc...
CIP vs. KYC: What’s the Difference?
Remote onboarding is becoming the new normal, and if your company doesn't adapt to the new work environment, your company will be left behind.
What is Remote Onboarding?
Remote onboarding is the ...
Remote Onboarding for the Modern Workforce
Wondering about private vs. public blockchains? Do you need a permissioned blockchain, or is permissionless the way to go? We've covered everything you need to know.
What are the four types of b...
Private vs. Public Blockchain – Differences Explained
Is a decentralized web the way to go, and is it the future of the world wide web? Should your business be preparing for this transition to decentralization?
What does a decentralized internet me...
What Is the Decentralized Web (Web 3.0)?
Understanding the semantic web can be confusing, so we break it down to help guide you through its technologies, history, and importance to the future of the web.
Why is the semantic web importa...
What Is the Semantic Web? (Includes Examples)
With the web in a constant state of flux, it's important to differentiate between Web 2.0 and Web 3.0 and prepare for the next web installation.
What is a Web 3.0 website? Web 3.0 is powered by ...
Web 2.0 vs. Web 3.0: Differences Defined
Two of the leading identity technologies go head to head in our post: Okta and Auth0. Which one is better for your business? Keep reading to find out.
Does Okta now own Auth0? Yes, Auth0 is now ...
Okta vs. Auth0 Comparison: Which Is Best for Business Use?
Hackers attack passwords systematically, and it's only a matter of time before they crack your login. What best practices can help secure your account?
What are best practices for creating a pas...