Many organizations are turning to passwordless authentication solutions to secure their systems and remove vulnerabilities from identity management.
Discover magic link authentication—a secure, ...
Knowledge-Based Authentication (KBA), is a security measure used to verify a person's identity by asking them to provide specific information that only they should know.
How Does Knowledge-Based A...
Knowledge-Based Authentication (KBA) Explained
Secure remote access is a method that lets authorized users access a private network as if they were on-premises with that network.
This includes accessing systems, resources, and data the user ...
What Is Secure Remote Access? Risks, Benefits & Solutions
Liveness detection is a biometric authentication process that verifies whether the user is a live person or just a spoofed artifact. Liveness detection is crucial in preventing security breaches an...
What Is Liveness Detection? Preventing Biometric Spoofing
Network attacks, while not as common as other typical hacks, still pose a significant threat to a world of always-online business. Specifically, a network snooping attack like Man-in-the-Browser (M...
What Is a Man in the Browser (MitB) Attack? How To Prevent It?
Encryption is a crucial part of most security frameworks and a foundational component of data protection across all digital applications. AES encryption, in particular, is a cornerstone of modern d...
What Is AES Encryption? The Complete Guide
Authentication is a crucial part of any web application, as it verifies the identity of the user and controls access to protected resources. One popular authentication method is JSON Web Token (JWT...
What Is JWT Authentication? How Does It Work?
There are several ways that hackers can steal passwords, and even encrypted credentials might be vulnerable to attacks.
What Is a Rainbow Table Attack?
A rainbow table attack is a type of attack ...
What is a Rainbow Table Attack? How To Protect Against It?
Encryption is a foundational tool to secure data from unauthorized disclosure and protect privacy for users and businesses.
What is private key cryptography? It is a form of encryption that uses...
What Is a Private Key & How Does It Work?
Social engineering is still one of the most successful forms of attack in the wild, including various phishing attacks. One form of this threat, spear phishing, uses research and user targeting to ...
What Is Spear Phishing? [Examples & Prevention Techniques]
In today's terminally-online age, fraud is a growing and ever-present concern for businesses.
Why is fraud detection important? Because successful fraud attempts can cost businesses significantl...
What Is Fraud Detection? [Definition & Prevention]
In authentication security, passwords are often the weak link, susceptible to several attacks.
What is password cracking? Password cracking is the use of different attacks to guess or expose a p...
What Is Password Cracking?
What Is a Password Guessing Attack?
Hackers never rest, and this truth is nowhere more apparent than in the world of password security.
What is a password guessing attack? A password guessing...
What Is a Password Guessing Attack?
Twitter is giving SMS-based two-factor authentication (2FA) the bird for all but its paid subscribers. But there's a simpler way to secure Twitter accounts without ruffling anyone's feathers.
In...
Twitter Ending SMS-based 2FA for Free Users –But Here’s a Better Way to Save $60 Million
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos Chief Strategy Officer, Mike Engle, to discuss how to deliver the privacy, security and convenience people have come to expect online...
5 Ways to Modernize Customer Onboarding and Defeat Account Takeover
It appears "Wednesday" fans can Netflix and chill about the streaming giant's looming password sharing lockdown—at least for a little while. But when it does take effect, the policy could still sen...
Netflix’s Password Sharing Crackdown Could Be So Much Easier
Modern hacks are getting more and more sophisticated, and this reality includes the rise of advanced phishing attacks.
Why are adversary-in-the-middle attacks dangerous? They are phishing attack...
What is an Adversary-In-The-Middle (AiTM) Phishing Attack?
There is a classic juxtaposition within security controls. Organizations need to make data and services available, but if it’s too easily accessible, too open, then a data breach can occur. On the ...
Zero Trust and Customer Experience
Problems with Passwords
Are passwords the weakest link in cybersecurity? We all know that it is risky to authenticate workers, citizens, and customers with passwords. The proof is in the seemingly...
3 Key Considerations in Your Passwordless Journey
Modern identity management relies on multi-factor authentication to maintain account security above and beyond simple passwords. One-Time Passwords (OTPs) are a vital part of this effort.
What a...
What Is a Time-Based One-Time Password (TOTP)?
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos Director of Solutions Engineering, Jay Baskar, to discuss how to deploy passwordless authentication across a diverse IT environment. ...
How to Deploy Passwordless Authentication Across a Diverse IT Environment
Modern cyber threats require dynamic and evolving security countermeasures, especially regarding authentication.
What is adaptive authentication? It is a dynamic, risk-based approach to authenti...
What is Adaptive Authentication and Authorization?
Modern threats are evolving rapidly in both scope and scale. Hackers are targeting governments and businesses alike with increasing sophistication.
What is an APT? It’s a complex, long-term atta...
What Is An Advanced Persistent Threat (APT)?
Authentication is a constant challenge for enterprise organizations managing teams accessing system resources from anywhere, at any time. New technologies are leveraging mobile devices to address t...