SAML SSO vs. LDAP can be challenging to parse out. Still, we go through both methods to help clear up the differences and help you decide which to use.
Is SSO possible with LDAP? Yes, SSO is pos...
While zero trust implementation can advance your security, you may want to know of the best practices to really get the most out of your zero trust framework.
What are the main concepts of zero ...
5 Zero Trust Best Practices for Implementation
SSO Protocols can be extremely helpful in your organization as it cuts down on time spent on logins, but how do you choose which protocol to use?
What is SSO? SSO stands for Single Sign-On (SSO)...
What Are Single Sign-On (SSO) Protocols?
OIDC vs. SAML: What's the Difference?
Security Assertion Markup Language (SAML) vs. OpenID Connect (OIDC): It can be challenging to choose between the two and decide which is best for business.
...
OIDC vs SAML: What’s the Difference?
What is passport scanning? Is there a convenient way to securely scan passports remotely? Our CSO, Mike Engle, joins our CMO, Michael Cichon, to answer these questions and more in their recent vlog...
Is There a Secure Way to Scan Passports Remotely?
As an information security standard, ISO 27001 can be beneficial to understand and comply with, but what exactly is ISO 27001?
What does ISO 27001 mean? ISO 27001 is a regulation for Information...
What is ISO 27001: Information Security Standard?
Looking to implement zero trust in your organization but don't know where to start? Keep reading to find the best way to get a zero-trust model up and running.
What is zero trust? Zero trust is ...
How to Implement a Zero Trust Security Model
As the teenager taking credit for last week's Uber hack so ably demonstrated, threat actors have found an unlikely accomplice in multifactor authentication. But how did cyberattackers manipulate MF...
Uber Hack: MFA Can’t Fix the Problem Until We Fix MFA
1Kosmos had the pleasure of attending the Gartner IAM Summit 2022 in Las Vegas. It was our first time exhibiting and sponsoring the event. I have to say it was great to see long time friends, forme...
Gartner IAM Thoughts and Observations
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos COO, Huzefa Olia, discuss best practices for fixing multifactor authentication.
https://player.vimeo.com/video/745520635
Michael Cicho...
Vlog: MFA Tried to Fix Passwords but How do we Fix MFA?
CEO fraud attacks can destroy a company's financial and reputational future but are there any ways to protect against these attacks?
What is CEO fraud? CEO fraud, also called executive or whale...
What is CEO Fraud? – Attacks & How to Prevent Them
Strong Customer Authentication works to protect European users when accessing sensitive financial information, but your company may also need it for compliance.
What is strong customer authentic...
What is Strong Customer Authentication (SCA) & PSD2?
I recently stumbled upon an article titled “Travelers Wants Out of Contract With Insured That Allegedly Misrepresented MFA Use” and I was immediately intrigued. Since I work at an organization that...
Cyber Insurance and MFA
Two of the leading identity technologies go head to head in our post: Okta and Auth0. Which one is better for your business? Keep reading to find out.
Does Okta now own Auth0? Yes, Auth0 is now ...
Okta vs. Auth0 Comparison: Which Is Best for Business Use?
With hackers becoming increasingly better at cracking logins, what are good password alternatives to protect your account and increase network security?
What can be used instead of passwords?
...
Top 10 Password Alternatives (Is the Future Passwordless?)
Password attacks are becoming easier to achieve with most people having too many passwords to remember, leading them to use the same password over and over.
What is a password attack? Password a...
8 Worst Password Attack Types & How to Stop Them
Clone phishing is a dangerous attack that can easily make it into any of your employees' inboxes. So what can you do to protect against it?
What is clone phishing? Clone phishing is a type of ph...
What Are Clone Phishing, Spear Phishing & Whaling?
Today (June 28, 0222), the FBI issued a warning stating that scammers may be trying to score jobs at companies to access customer or financial data, corporate IT databases, and/or proprietary infor...
FBI Issues Warning – Deepfakes and Stolen PII Utilized to Apply for Remote Work Positions
SIM binding is growing in popularity due to the ease of use and the greater amount of security provided compared to PIN code verification.
What is SIM binding? SIM binding is a type of device bi...
What Is SIM binding? [How to Prevent Online Fraud]
The 2022 Verizon Data Breach report found that a staggering 82% of breaches this year were caused by the human element which encompasses errors, misuse, and social engineering. The report also foun...
How Does 1Kosmos Augment Zscaler?
The Way Things Used to Be
During the pandemic, life and work changed rapidly. Appointments needed to be conducted remotely, which resulted in some employees never even meeting each other in person...
Reflections from 1Kosmos All Hands Meeting in India
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon, to discuss FIDO's May 5th announcement and what it means for the future of pa...
Vlog: FIDO and the Future of Passwordless
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon to discuss how a zero trust architecture can be defeated. They also discuss ho...
Vlog: How to Defeat a Zero Trust Architecture
This week, Verizon released its DBIR report marking 15 years of the annual report. In the report, Verizon highlighted their analysis of more than 5,212 breaches and 23,896 security incidents to fin...