Join Robert MacDonald, VP of Product Marketing at 1Kosmos, and Vikram Subramanian, VP of Solutions, as they explore the integration of 1Kosmos with Microsoft Entra, enabling passwordless authentica...
Recently, the cybersecurity world was rocked by another significant breach, this time involving Snowflake, a major player in the data storage and analysis industry. The breach, orchestrated by the ...
Understanding the Snowflake Data Breach and Its Implications
Are you still relying on traditional passwords to authenticate users, even while cyber threats grow more sophisticated today? This article will examine passkey authentication work, a modern digital...
What are Passkeys and How Do They Work?
In a hybrid world that blends on-premises and cloud-based resources, securing access to sensitive data and systems is no longer achieved by defending a perimeter, but through authentication. While ...
Four Ways to Align Authentication with Business Needs
Join Michael Cichon, CMO, and Mike Engle, CSO of 1Kosmos, as they introduce 1Key, a groundbreaking biometric authentication solution. Learn how 1Key eliminates passwords and mobile devices, offerin...
Vlog: Introducing the 1Kosmos 1Key Biometric Security Key
In the ever-evolving landscape of cybersecurity, Multi-Factor Authentication (MFA) stands as a critical defense mechanism. Gartner's recent report, "Seven Tracks to a Mature MFA Implementation," wr...
Navigating Gartner’s Seven Tracks to MFA Maturity with 1Kosmos
The team here at 1Kosmos is excited to announce the release of 1Kosmos 1Key, a phishing-resistant biometric security key that supports authentication for unlimited users per device. The 1Key reduce...
Unlocking the Future of Secure Authentication for Shared Workstations with 1Kosmos 1Key
Watch our latest vlog for an insightful conversation between Michael Cichon, Chief Marketing Officer at 1Kosmos, and Siddharth Gandhi, Chief Operating Officer of the Asia Pacific region. In this vi...
Vlog: How the Reserve Bank of India Guidelines Align with 1Kosmos
The recent ransomware attack on Change Healthcare, a major healthcare technology company, has once again highlighted the critical importance of robust identity verification and authentication measu...
The Recent Change Healthcare Ransomware Attack: Lessons Learned and How to Prevent Similar Breaches
Discover the simplicity and security of magic link authentication in this article. We dive into how magic links work, providing a hassle-free and secure alternative to traditional passwords. By exp...
Magic Links Demystified: Simplifying and Securing User Logins
Ensuring the safety of sensitive data and privacy shifts from just a priority to an absolute necessity. Authentication, the gatekeeper of these digital resources, is crucial in this fight against c...
Understanding Step Up Authentication: From Basics to Benefits
Identity and Access Management (IAM) is crucial in managing and authenticating users and securing access to organizational resources. IAM involves identifying users in a system and controlling thei...
The Truth About Passwordless IAM Authentication
Recent reports from the FBI have shed light on the escalating cyber espionage activities orchestrated by state-sponsored actors, particularly those emanating from China. Case in point -- the emerge...
Strengthening Cybersecurity in the Face of Rising Threats
Join Rob MacDonald, VP of Product Marketing, and Huzefa Olia, COO of 1Kosmos, as they unveil the exciting integration news with Amazon Cognito. Learn about the significance of 1Kosmos becoming an A...
Vlog: 1Kosmos Adds Passwordless Authentication to Amazon Cognito
Multi-factor authentication (MFA) has emerged as a pivotal tool in cybersecurity, a security key to bolstering the fortifications guarding sensitive information and systems. Essential to comprehend...
What is MFA Fatigue and How Can Your Business Combat it?
What is FIDO Passwordless Authentication?
Fast Identity Online (FIDO) is an advanced security protocol that seeks to eliminate the need for passwords, moving towards a more secure and user-friendl...
Unleashing the Power of FIDO Passwordless Authentication with 1Kosmos BlockID
Have you ever wondered how a small piece of plastic could be your key to enhanced security and operational efficiency? This article dives into the intricacies of smart card technology, a robust sol...
Understanding Smart Card Authentication
Businesses face an ever-expanding array of cyber threats. Phishing, the deceptive practice of tricking individuals into divulging sensitive information, sits prominently at the top. It's not just a...
What Is Phishing Resistant MFA and How Can You Implement It?
I am very excited to announce that 1Kosmos is an official AWS Cognito Passwordless MFA partner.
Amazon Cognito places the utmost importance on online account security. To bolster the protection ...
Bringing 1Kosmos Passwordless Security to AWS Cognito
PCI DSS version 4.0 is the latest iteration of the Payment Card Industry Data Security Standard, released on March 31, 2022, and is currently in effect. The previous version, PCI DSS version 3.2.1,...
Are You Ready for PCI DSS Version 4.0?
Given the stunning success of the recent hacks at MGM and Caesars, it's a safe bet what happened in Vegas won't stay there for long. Even though technology to prevent such breaches is readily avail...
MGM, Caesars Hacks: More of the Same Is Coming Your Way–But Here’s How to Stop It
What if the key to your hotel room was suddenly useless, and your personal information was floating in the digital ether? This happened after the recent MGM Resorts cyberattack; the vulnerabilities...
Unmasking the MGM Resorts Cyber Attack: Why Identity-Based Authentication is the Future
In the ever-evolving landscape of cybersecurity, it's crucial to stay up to date with the latest innovations and technologies designed to enhance online security. One such innovation that has gaine...
Demystifying Passkeys: A Future of Passwordless Authentication
Introduction
Traditional password-based authentication techniques are vulnerable to online attacks. Fortunately, a ground-breaking remedy called an identity-based passwordless authentication syste...