NIST compliance provides security standards for businesses handling federal information, but how do you meet these compliance regulations?
What is NIST compliance? NIST compliance is the Nationa...
Permissionless and permissioned blockchains are being used every day, but how do you figure out which one you should use?
What does permissionless mean? Permissionless means that it does not req...
Permissionless vs. Permissioned Blockchains: Pros & Cons
With hackers becoming increasingly better at cracking logins, what are good password alternatives to protect your account and increase network security?
What can be used instead of passwords?
...
Top 10 Password Alternatives (Is the Future Passwordless?)
What is the future of biometrics, and are there opportunities for my business to become more secure through biometric authentication? Keep reading to find out.
What is the future of biometrics?
...
What Is the Future of Biometric Technology? Trends to Watch
Password attacks are becoming easier to achieve with most people having too many passwords to remember, leading them to use the same password over and over.
What is a password attack? Password a...
8 Worst Password Attack Types & How to Stop Them
Clone phishing is a dangerous attack that can easily make it into any of your employees' inboxes. So what can you do to protect against it?
What is clone phishing? Clone phishing is a type of ph...
What Are Clone Phishing, Spear Phishing & Whaling?
Today (June 28, 0222), the FBI issued a warning stating that scammers may be trying to score jobs at companies to access customer or financial data, corporate IT databases, and/or proprietary infor...
FBI Issues Warning – Deepfakes and Stolen PII Utilized to Apply for Remote Work Positions
SIM binding is growing in popularity due to the ease of use and the greater amount of security provided compared to PIN code verification.
What is SIM binding? SIM binding is a type of device bi...
What Is SIM binding? [How to Prevent Online Fraud]
The 2022 Verizon Data Breach report found that a staggering 82% of breaches this year were caused by the human element which encompasses errors, misuse, and social engineering. The report also foun...
How Does 1Kosmos Augment Zscaler?
SOC 2 compliance should be at the top of the list for all technology services, software-as-a-service organizations, and service providers managing or storing customer data in the cloud.
What is ...
What Is SOC 2 Compliance & Certification?
The Way Things Used to Be
During the pandemic, life and work changed rapidly. Appointments needed to be conducted remotely, which resulted in some employees never even meeting each other in person...
Reflections from 1Kosmos All Hands Meeting in India
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon, to discuss FIDO's May 5th announcement and what it means for the future of pa...
Vlog: FIDO and the Future of Passwordless
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon to discuss how a zero trust architecture can be defeated. They also discuss ho...
Vlog: How to Defeat a Zero Trust Architecture
This week, Verizon released its DBIR report marking 15 years of the annual report. In the report, Verizon highlighted their analysis of more than 5,212 breaches and 23,896 security incidents to fin...
Verizon 2022 Data Breach Investigations Report
Why Implement Biometric MFA?
We are all aware of the risks associated with password-based authentication. The proof is in the seemingly endless list of password-based breaches that we see in the n...
What Does Identity Really Mean in Zero Trust
The road to zero trust can be bumpy for nearly any organization. While CISOs need to make data and services accessible to their users, they also need to protect the same data and services in order ...
How to Defeat a Zero Trust Architecture
Business email compromise is one of the many types of phishing attacks targeting both large and small corporations for financial gain.
What is a BEC attack? A BEC attack is a type of phishing sc...
BEC Attacks: What Is Business Email Compromise?
In my last blog post, I started discussing the implications of identity verification and facial recognition where organizations didn’t consider components of a zero trust architecture. Specifically...
How to Reform the Delivery of Government Services via Internet Pt 2
The move to biometric authentication started as far back as 2004 when IBM introduced fingerprint readers. Biometrics went mainstream when Apple released TouchID on the iPhone in 2013.
Since then...
How to Reform the Delivery of Government Services via Internet Pt 1
Identity providers are a seamless way to authenticate your users and also maintain security on your enterprise network.
What is an identity provider? An identity provider is a service that verif...
What Is an Identity Provider? Benefits of IdPs
When great minds and visionary leaders come together, good things can happen. Better yet, when they come together with a shared interest to solve a challenge and bring along specialized teams with ...
AuthenticID and 1Kosmos: A Shared Vision to Unify Identity Proofing and Authentication
Passwordless authentication is becoming a hot topic in the identity verification field as capabilities are becoming more and more sophisticated. To eliminate passwords the market has shifted to aut...
Why Device Level Biometrics Do Not Equate to Identity
In this video blog, our CTO, Rohan Pinto, joins our CMO, Michael Cichon, to discuss why architecture matters for security and privacy in citizen ID.
https://player.vimeo.com/video/706244577
W...
Why Architecture Matters for Security and Privacy in Citizen ID
Strong authentication can be the difference between hackers easily slipping into your network and stealing your data or being able to block them from the start.
What is strong authentication? St...