Email phishing can be tricky to spot, cost your company thousands of dollars, and tarnish your reputation, so how can you protect against these attacks?
What Is Email Phishing?
Email phishing is ...
A one-time password can be used for many authentication needs including securing private information or creating an alternative to a password reset.
What is a One-Time Password?
A one-time passwo...
What Is a One-Time Password & When Is It Used?
Whale phishing attacks can deplete an organization of millions and destroy reputations. Is your company protected from these attacks?
What is whale phishing? Whale phishing is a spear phishing a...
Whale Phishing: What Is a Whaling Attack?
FIDO2 authentication goes beyond simply being an extension of FIDO or the FIDO alliance and adds in new protocols for passwordless authentication.
What does FIDO2 stand for? FIDO2 stands for Fas...
FIDO2 Authentication vs. FIDO: What’s the Difference?
This week news broke about the strategic partnership between 1Kosmos and AuthenticID. This is an industry first that provides end-to-end strong identity proofing and authentication solutions for ci...
1Kosmos and AuthenticID Announce Strategic Partnership
Using MFA is a great starting point, but you'll want to know multi-factor authentication best practices to get the most out of your MFA solution.
What are the four factors of multi-factor authen...
Best Practices For Multi-Factor Authentication (MFA)
We hope to create the ultimate expression of a developer experience for passwordless authentication and identity proofing. The roles and responsibilities of developers have continued to expand in t...
1Kosmos Developer Experience
Ransomware has been increasing significantly. India is now amongst the top five targeted countries in the APAC region. 49% of organizations in India suffered multiple ransomware attacks in the past...
Ransomware in India
In 2010, Forrester analyst John Kindervag coined the term “Zero Trust” in his research – emphasizing that all network traffic is untrusted and that any request to access any resource must be done s...
How Zero Trust Security Frameworks Work
Costs of multi-factor authentication can range drastically, but trying to figure out which provider is worth the money can be the hardest part.
Is multi-factor authentication free? While you may...
Cost of Multi-Factor Authentication: Is It Worth the Price?
Looking for a multi-factor authentication solution but can't decide which is best for your business? We've compiled the best MFA providers to help you choose.
Which is the best multi-factor auth...
Top Multi-Factor Authentication (MFA) Solutions for Business
KYC software can provide vital reassurance to many financial institutions that their customers aren't laundering money through their organization.
What is KYC software? Know your customer softwa...
What Is Know Your Customer (KYC) Software?
What Is Zero Trust?
Zero Trust is a proactive security approach that continuously verifies users, devices, and services before trusting them. This approach is commonly summarized as “never trust, ...
How Does Identity Impact the Six Pillars of Zero Trust?
If you're looking for the best SSO solution, you'll want to keep reading. We found the top SSO solutions for businesses to help your company with user experience and security.
What is an SSO sol...
Top 7 SSO Software Solutions For Business
Using distributed identity management for your business should be a no-brainer, especially if you're worried about security for your employees' logins.
But what is blockchain authentication? Blo...
Blockchain Authentication: Security for Digital Identities
Authentication as a service (AaaS) is becoming the extra level of security every company needs in the ever evolving business landscape of remote work.
What is Authentication As A Service?
Authent...
What Is Authentication as a Service (AaaS)?
In the physical world, proving identity is straightforward. First, you present your driver’s license or a physical identity card, which is compared to your likeness and verified. Then, you put your...
Who Is on the Other Side of Your Digital Connections?
In this vlog, Jim Ducharme, Chief Operating Officer at Outseer, and Michael Engle, Chief Strategy Officer at 1Kosmos, discuss how 1Kosmos and Outseer are partnering to prevent account takeover (ATO...
Vlog: 1Kosmos and Outseer Strategic Partnership Extends Use Cases of Outseer Fraud Manager
Problems with Passwords
Are passwords the weakest link in cybersecurity? We all know that it is risky to authenticate workers, citizens, and customers with passwords. The proof is in the seemingly...
3 Things Missing In Your Current Passwordless Strategy
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos VP of Product Management, Javed Shah, discuss why it's important to onboard a third-party with identity-based authentication.
Michael:
...
How to Onboard a Third-Party with Identity-Based Authentication
With remote workers accessing documents in the cloud, authentication services have never become more important or relevant than they are right now.
What is the purpose of cloud authentication? T...
Cloud Authentication Services | Security for Enterprise IT
Problems with Passwords
We all know that it is risky to authenticate employees, contractors, citizens and customers with passwords. The proof is in the seemingly endless list of credential based s...
Passwordless Authentication Has An Identity Crisis
What Is Multi-Factor Authentication?
Multi-factor authentication requires users to provide multiple credentials to access a system, which could include a username and password combination, a PIN, ...
What Is Multi-Factor Authentication (MFA) & How Does It Work?
Password Based Authentication Belongs in the Past
Password based authentication does not actually verify who is on the other end of the digital connection. This leads to anonymous users hiding beh...