In this vlog, our CSO, Michael Engle, joins our CMO, Michael Cichon, to discuss how to extend Windows Hello in your journey to passwordless.
https://player.vimeo.com/video/706161992
Michael C...
Self-sovereign identities are the future of digital identities. Putting the control back into the hands of the users allows for greater security everywhere.
What is self-sovereign identity? Self...
What Is Self-Sovereign Identity? (The Future of ID?)
Distributed digital identity, decentralized identity, blockchain, and distributed ledgers: what do they mean and how can they help keep my company secure?
What is a digital identity? A digital i...
What Is Distributed Identity? How Decentralized ID Works
Passwords are a problem… we all know it. It’s all over our website and countless others. Vendors are trying to help organizations to course correct to solve the problem. Microsoft’s Windows Hello f...
6 Technology Gaps to Consider When Implementing Windows Hello For Business
Karla interviews Hemen Vimadalal, CEO at 1Kosmos and an investor in a number of cybersecurity businesses. Hemen talks about his experience with identity theft and how that has driven him to create ...
1Kosmos CEO Hemen Vimadalal Podcast Interview with Karla Reffold
Phishing is costing companies billions of dollars but executive phishing can make these attacks more costly because of who the attackers are spoofing.
What is executive phishing? Executive phish...
What Is Executive Phishing? (How to Protect Against Whaling)
Online document verification has become a useful tool in the current environment of remote onboarding; it eliminates the need for in-person verification.
What is the document verification proces...
Online Document Verification: How Does It Work?
Email phishing can be tricky to spot, cost your company thousands of dollars, and tarnish your reputation, so how can you protect against these attacks?
What Is Email Phishing?
Email phishing is ...
What Is Email Phishing? (& How to Prevent It)
When news of the Lapsus$ breach at Okta surfaced a few days ago it initially seemed of little consequence. The explanation that a 3rd party contractor with limited access had been compromised seeme...
The Lapsus$ Breach at Okta and Why Single Sign On Needs an Identity Layer
In this vlog, 1Kosmos COO, Huzefa Olia, and CMO, Michael Cichon, discuss why government agencies like the Cybersecurity and Infrastructure Security Agency have been encouraging MFA. They explore th...
Vlog: Advanced Biometrics for MFA
In June 2021, the European Commission proposed an update to its pan-European digital identity framework, which will give every European a set of digital identity credentials that will be recognized...
What Is eIDAS 2.0?
Biometrics may sound like a new type of technology, but it has actually been around for decades and for a good reason—biometrics are hard to hack.
Why are biometrics used for security? Biometric...
Using Biometrics in Security: Pros & Cons
A one-time password can be used for many authentication needs including securing private information or creating an alternative to a password reset.
What is a One-Time Password?
A one-time passwo...
What Is a One-Time Password & When Is It Used?
Whale phishing attacks can deplete an organization of millions and destroy reputations. Is your company protected from these attacks?
What is whale phishing? Whale phishing is a spear phishing a...
Whale Phishing: What Is a Whaling Attack?
FIDO2 authentication goes beyond simply being an extension of FIDO or the FIDO alliance and adds in new protocols for passwordless authentication.
What does FIDO2 stand for? FIDO2 stands for Fas...
FIDO2 Authentication vs. FIDO: What’s the Difference?
Enable MFA!
CISA Director, Jen Easterly posted a video about how to enable MFA across all of your accounts. It's important to do as it ensures organizational security. But not all MFA is created e...
Advanced Biometrics Based Multi-Factor Authentication
Online identity verification solutions are fast and easy to verify someone's ID without requiring documents to be supplied in person.
What is online identity verification? Online identity verifi...
How Online Identity Verification Works
In my last blog post, I started discussing the implications of identity verification and facial recognition where organizations didn’t consider components of a zero trust architecture. Specifically...
The Advantages and Implications of Using Facial Recognition for Identity Verification Pt 2
The move to biometric authentication started as far back as 2004 when IBM introduced fingerprint readers. Biometrics went mainstream when Apple released TouchID on the iPhone in 2013.
Since then...
The Advantages and Implications of Using Facial Recognition for Identity Verification
Finding the best identity verification solution may be difficult depending on the features your business requires, but we make it easy with our top 5 guide.
The Top 5 Identity Verification Solutio...
Top 5 Identity Verification Solutions & Software
This week news broke about the strategic partnership between 1Kosmos and AuthenticID. This is an industry first that provides end-to-end strong identity proofing and authentication solutions for ci...
1Kosmos and AuthenticID Announce Strategic Partnership
Password spraying is a risk for all organizations; if one person's account gets hacked, the attacker could access vast amounts of sensitive information.
What is password spraying? Password spray...
What Is Password Spraying? [Brute-Force Attack Prevention]
Using MFA is a great starting point, but you'll want to know multi-factor authentication best practices to get the most out of your MFA solution.
What are the four factors of multi-factor authen...
Best Practices For Multi-Factor Authentication (MFA)
Yesterday (February 9, 2022) the FBI issued a warning to inform the American public and mobile carriers about the increasing threat of SIM (Subscriber Identity Module) swapping. In 2020, criminals ...