Looking to implement zero trust in your organization but don't know where to start? Keep reading to find the best way to get a zero-trust model up and running.
What is zero trust? Zero trust is ...
As the teenager taking credit for last week's Uber hack so ably demonstrated, threat actors have found an unlikely accomplice in multifactor authentication. But how did cyberattackers manipulate MF...
Uber Hack: MFA Can’t Fix the Problem Until We Fix MFA
1Kosmos had the pleasure of attending the Gartner IAM Summit 2022 in Las Vegas. It was our first time exhibiting and sponsoring the event. I have to say it was great to see long time friends, forme...
Gartner IAM Thoughts and Observations
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos COO, Huzefa Olia, discuss best practices for fixing multifactor authentication.
https://player.vimeo.com/video/745520635
Michael Cicho...
Vlog: MFA Tried to Fix Passwords but How do we Fix MFA?
Brute force attacks are systematic attacks that continue to attack your logins until they find the correct login information. How can you protect against this?
What is a brute force attack? A br...
What Is a Brute Force Attack & How Do You Prevent Them?
CEO fraud attacks can destroy a company's financial and reputational future but are there any ways to protect against these attacks?
What is CEO fraud? CEO fraud, also called executive or whale...
What is CEO Fraud? – Attacks & How to Prevent Them
Strong Customer Authentication works to protect European users when accessing sensitive financial information, but your company may also need it for compliance.
What is strong customer authentic...
What is Strong Customer Authentication (SCA) & PSD2?
With so many login attacks out there, it's hard to keep track of them all, but credential stuffing is on the rise and is important to be able to recognize.
What is credential stuffing? Credentia...
What Is a Credential Stuffing Attack?
I recently stumbled upon an article titled “Travelers Wants Out of Contract With Insured That Allegedly Misrepresented MFA Use” and I was immediately intrigued. Since I work at an organization that...
Cyber Insurance and MFA
Two of the leading identity technologies go head to head in our post: Okta and Auth0. Which one is better for your business? Keep reading to find out.
Does Okta now own Auth0? Yes, Auth0 is now ...
Okta vs. Auth0 Comparison: Which Is Best for Business Use?
With hackers becoming increasingly better at cracking logins, what are good password alternatives to protect your account and increase network security?
What can be used instead of passwords?
...
Top 10 Password Alternatives (Is the Future Passwordless?)
Password attacks are becoming easier to achieve with most people having too many passwords to remember, leading them to use the same password over and over.
What is a password attack? Password a...
8 Worst Password Attack Types & How to Stop Them
Clone phishing is a dangerous attack that can easily make it into any of your employees' inboxes. So what can you do to protect against it?
What is clone phishing? Clone phishing is a type of ph...
What Are Clone Phishing, Spear Phishing & Whaling?
Today (June 28, 0222), the FBI issued a warning stating that scammers may be trying to score jobs at companies to access customer or financial data, corporate IT databases, and/or proprietary infor...
FBI Issues Warning – Deepfakes and Stolen PII Utilized to Apply for Remote Work Positions
SIM binding is growing in popularity due to the ease of use and the greater amount of security provided compared to PIN code verification.
What is SIM binding? SIM binding is a type of device bi...
What Is SIM binding? [How to Prevent Online Fraud]
The 2022 Verizon Data Breach report found that a staggering 82% of breaches this year were caused by the human element which encompasses errors, misuse, and social engineering. The report also foun...
How Does 1Kosmos Augment Zscaler?
The Way Things Used to Be
During the pandemic, life and work changed rapidly. Appointments needed to be conducted remotely, which resulted in some employees never even meeting each other in person...
Reflections from 1Kosmos All Hands Meeting in India
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon, to discuss FIDO's May 5th announcement and what it means for the future of pa...
Vlog: FIDO and the Future of Passwordless
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon to discuss how a zero trust architecture can be defeated. They also discuss ho...
Vlog: How to Defeat a Zero Trust Architecture
This week, Verizon released its DBIR report marking 15 years of the annual report. In the report, Verizon highlighted their analysis of more than 5,212 breaches and 23,896 security incidents to fin...
Verizon 2022 Data Breach Investigations Report
When great minds and visionary leaders come together, good things can happen. Better yet, when they come together with a shared interest to solve a challenge and bring along specialized teams with ...
AuthenticID and 1Kosmos: A Shared Vision to Unify Identity Proofing and Authentication
Strong authentication can be the difference between hackers easily slipping into your network and stealing your data or being able to block them from the start.
What is strong authentication? St...
What Is Strong Authentication? (With Examples & Methods)
In this vlog, our CSO, Michael Engle, joins our CMO, Michael Cichon, to discuss how to extend Windows Hello in your journey to passwordless. If you are interested in learning more, please register ...
How to Extend Windows Hello in Your Journey to Passwordless
Passwords are a problem… we all know it. It’s all over our website and countless others. Vendors are trying to help organizations to course correct to solve the problem. Microsoft’s Windows Hello f...