Using distributed identity management for your business should be a no-brainer, especially if you're worried about security for your employees' logins.
But what is blockchain authentication? Blo...
Authentication as a service (AaaS) is becoming the extra level of security every company needs in the ever evolving business landscape of remote work.
What is Authentication As A Service?
Authen...
What Is Authentication as a Service (AaaS)?
In the physical world, proving identity is straightforward. First, you present your driver’s license or a physical identity card, which is compared to your likeness and verified. Then, you put your...
Who Is on the Other Side of Your Digital Connections?
In this vlog, Jim Ducharme, Chief Operating Officer at Outseer, and Michael Engle, Chief Strategy Officer at 1Kosmos, discuss how 1Kosmos and Outseer are partnering to prevent account takeover (ATO...
Vlog: 1Kosmos and Outseer Strategic Partnership Extends Use Cases of Outseer Fraud Manager
Problems with Passwords
Are passwords the weakest link in cybersecurity? We all know that it is risky to authenticate workers, citizens, and customers with passwords. The proof is in the seemingly...
3 Things Missing In Your Current Passwordless Strategy
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos VP of Product Management, Javed Shah, discuss why it's important to onboard a third-party with identity-based authentication.
Michael...
How to Onboard a Third-Party with Identity-Based Authentication
With remote workers accessing documents in the cloud, authentication services have never become more important or relevant than they are right now.
What is the purpose of cloud authentication? ...
Cloud Authentication Services | Security for Enterprise IT
Problems with Passwords
We all know that it is risky to authenticate employees, contractors, citizens and customers with passwords. The proof is in the seemingly endless list of credential based s...
Passwordless Authentication Has An Identity Crisis
What Is Multi-Factor Authentication?
Multi-factor authentication requires users to provide multiple credentials to access a system, which could include a username and password combination, a PIN, ...
What Is Multi-Factor Authentication (MFA) & How Does It Work?
Password Based Authentication Belongs in the Past
Password based authentication does not actually verify who is on the other end of the digital connection. This leads to anonymous users hiding beh...
Hyderabad Is Ready for Next-Gen MFA
Challenges In Digital Onboarding
With an increasingly digital world, identity fraud has become an even more pressing issue. To mitigate fraud, companies should embrace the same “Know Your Customer...
Digital Onboarding and Banking Experience Summit
Transitioning From Password Based Authentication to Identity Based Authentication
Passwords really aren’t the problem. It’s anonymous users hiding behind compromised credentials that represent one...
Building a Customer First Approach to Identity Based Authentication
In this vlog, our CSO, Mike Engle, and CMO, Michael Cichon, discuss marrying ID and authentication.
Michael Cichon:
Good morning, Michael Engle, Chief Strategy Officer at 1Kosmos. Welcome bac...
Vlog: Marrying ID and Authentication
With the recent introduction of the SCA compliance requirements, authentication is becoming a key player in protecting against fraud and securing payments.
What is Strong Customer Authentication C...
Strong Customer Authentication Compliance
New hire fraud is a top concern for Chief Security Officers (CSOs) in most organizations. With the rise of remote work during the COVID-19 pandemic, these concerns have only been exacerbated. Many ...
Is Your New Employee Really Who They Say They Are?
What is an Identity Verification System?
An identity verification systems is a type of software that ensures a person is who they claim to be; for businesses, user identities need to be verified t...
Identity Verification Systems Explained
1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss onboarding, ID proofing, and strong customer authentication in this vlog.
Michael Cichon:
Let's welcome Mike Engle, Chief Strategy O...
Vlog: Onboarding, ID Proofing, Strong Customer Authentication
The Old Way: Friction Filled Authentication
In today’s digital world, most of us face authentication problems on a daily basis. Whether your records were some of the 37 billion that were compromis...
Introducing the 1Kosmos Appless Feature
A random jumble of letters is a secure password, but will you remember it? Password management can secure your account without memorizing these long passwords.
What is Password Management?
Passwo...
Guide to Password Management for Employees
1Kosmos CTO, Rohan Pinto, and CMO, Michael Cichon, discuss appless authentication in this recent vlog.
Michael Cichon:
All right, welcome Rohan Pinto, chief technology officer at 1Kosmos. It's ...
Vlog: Appless Authentication
Identification is only one part of the detection process; add in authentication and you can strongly guarantee a user is who they truly claim to be.
How Does Identity Authentication Work?
Verifyi...
How Identity Authentication Works
Curious about passwordless authentication? Wondering how it can create a more secure login? We'll walk you through what it is and how it works in an enterprise.
Is passwordless authentication sa...
Guide to Passwordless Authentication
During this year’s RSA conference, 1Kosmos was named a Global InfoSec Awards winner in the Next-Gen in Blockchain Security category by Cyber Defense Magazine (CDM), the industry’s leading electroni...
1Kosmos Wins Global InfoSec Award During RSA Conference 2021
The Colonial Pipeline Attack: An Authentication Crisis
If you live on the east coast of the United States, you are probably still facing the consequences of the Colonial Pipeline Attack: scrambl...