Join Rob MacDonald, VP of Product Marketing, and Mike Engle, Co-founder of 1Kosmos, as they discuss the recent cyber attack on MGM and explore the world of vishing (voice phishing) in this informat...
Identity Based Authentication: The Key to Preventing Future MGM-Style Attacks
In this vlog, 1Kosmos CSO, Mike Engle, is joined by CodeCluster CEO, Mike Vitez, to discuss how 1Kosmos, Arculus, and CodeCluster partner to reduce fraud.
https://player.vimeo.com/video/...
1Kosmos, CodeCluster, and Arculus Partner to Reduce Fraud
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos Chief Strategy Officer, Mike Engle, to discuss how to deliver the privacy, security and convenience people have come to expect online...
5 Ways to Modernize Customer Onboarding and Defeat Account Takeover
Problems with Passwords
Are passwords the weakest link in cybersecurity? We all know that it is risky to authenticate workers, citizens, and customers with passwords. The proof is in the seemingly...
3 Key Considerations in Your Passwordless Journey
It's 2023—do you know what your identity is doing? As the adoption of digital channels continues to be matched by corresponding levels of fraud, the ability to achieve digital identity verification...
6 Digital Identity Predictions for 2023
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos CSO, Mike Engle, to discuss how digital identity can modernize healthcare. If you are interested in learning more about this topic, p...
The Role of Digital Identity in Modernizing Health Care
The Importance of Digital Identity and Wallets in Healthcare
Traditional processes in today's healthcare landscape have left sensitive personal information scattered across a lifetime of providers...
The Importance of Digital Identity in Healthcare
In this vlog, our CMO, Michael Cichon, is joined by our CSO, Mike Engle, to discuss how digital identity verification can be used to combat synthetic identity fraud and account takeover. If you are...
Combatting Synthetic Identity Fraud and Account Takeover With Digital Identity Verification
What is passport scanning? Is there a convenient way to securely scan passports remotely? Our CSO, Mike Engle, joins our CMO, Michael Cichon, to answer these questions and more in their recent vlog...
Is There a Secure Way to Scan Passports Remotely?
Why Implement Biometric MFA?
We are all aware of the risks associated with password-based authentication. The proof is in the seemingly endless list of password-based breaches that we see in the n...
Biometric Based MFA for Zero Trust
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon, to discuss FIDO's May 5th announcement and what it means for the future of pa...
Vlog: FIDO and the Future of Passwordless
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon to discuss how a zero trust architecture can be defeated. They also discuss ho...
Vlog: How to Defeat a Zero Trust Architecture
Why Implement Biometric MFA?
We are all aware of the risks associated with password-based authentication. The proof is in the seemingly endless list of password-based breaches that we see in the n...
What Does Identity Really Mean in Zero Trust
In this vlog, our CSO, Michael Engle, joins our CMO, Michael Cichon, to discuss how to extend Windows Hello in your journey to passwordless.
https://player.vimeo.com/video/706161992
Michael C...
How to Extend Windows Hello in Your Journey to Passwordless
Using MFA is a great starting point, but you'll want to know multi-factor authentication best practices to get the most out of your MFA solution.
What are the four factors of multi-factor authen...
Best Practices For Multi-Factor Authentication (MFA)
In 2010, Forrester analyst John Kindervag coined the term “Zero Trust” in his research – emphasizing that all network traffic is untrusted and that any request to access any resource must be done s...
How Zero Trust Security Frameworks Work
Costs of multi-factor authentication can range drastically, but trying to figure out which provider is worth the money can be the hardest part.
Is multi-factor authentication free? While you may...
Cost of Multi-Factor Authentication: Is It Worth the Price?
Looking for a multi-factor authentication solution but can't decide which is best for your business? We've compiled the best MFA providers to help you choose.
Which is the best multi-factor auth...
Top Multi-Factor Authentication (MFA) Solutions for Business
KYC software can provide vital reassurance to many financial institutions that their customers aren't laundering money through their organization.
What is KYC software? Know your customer softwa...
What Is Know Your Customer (KYC) Software?
What Is Zero Trust?
Zero Trust is a proactive security approach that continuously verifies users, devices, and services before trusting them. This approach is commonly summarized as “never trust, ...
How Does Identity Impact the Six Pillars of Zero Trust?
Using distributed identity management for your business should be a no-brainer, especially if you're worried about security for your employees' logins.
But what is blockchain authentication? Blo...
Blockchain Authentication: Security for Digital Identities
Authentication as a service (AaaS) is becoming the extra level of security every company needs in the ever evolving business landscape of remote work.
What is Authentication As A Service?
Authen...
What Is Authentication as a Service (AaaS)?
With biometrics becoming the new secure password replacement, iris biometrics help verify and authenticate account access.
So, how do iris biometrics work? Iris biometrics work by scanning someo...
How Do Iris Biometrics Work?
It’s important for individuals to have more control and ownership over their digital identity and that can be done with decentralized identities.
What is a decentralized identity?
A decentralized...
What Is a Decentralized Identity on Blockchain?
In this vlog, Jim Ducharme, Chief Operating Officer at Outseer, and Michael Engle, Chief Strategy Officer at 1Kosmos, discuss how 1Kosmos and Outseer are partnering to prevent account takeover (ATO...
Vlog: 1Kosmos and Outseer Strategic Partnership Extends Use Cases of Outseer Fraud Manager
Problems with Passwords
Are passwords the weakest link in cybersecurity? We all know that it is risky to authenticate workers, citizens, and customers with passwords. The proof is in the seemingly...
3 Things Missing In Your Current Passwordless Strategy
With remote workers accessing documents in the cloud, authentication services have never become more important or relevant than they are right now.
What is the purpose of cloud authentication? ...
Cloud Authentication Services | Security for Enterprise IT
What Is Multi-Factor Authentication?
Multi-factor authentication requires users to provide multiple credentials to access a system, which could include a username and password combination, a PIN, ...
What Is Multi-Factor Authentication (MFA) & How Does It Work?
Challenges In Digital Onboarding
With an increasingly digital world, identity fraud has become an even more pressing issue. To mitigate fraud, companies should embrace the same “Know Your Customer...
Digital Onboarding and Banking Experience Summit
What is Biometric Authentication?
Biometric authentication is the use of physical traits from users to verify their identity when they attempt to access systems or user accounts. In this discussio...
What Is Biometric Authentication? Pros, Cons & Use Cases
In this vlog, our CSO, Mike Engle, and CMO, Michael Cichon, discuss marrying ID and authentication.
Michael Cichon:
Good morning, Michael Engle, Chief Strategy Officer at 1Kosmos. Welcome bac...
Vlog: Marrying ID and Authentication
In this vlog, 1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss the 20th anniversary of 9/11 and how the attacks changed our security landscape.
Michael Cichon:
Welcome, Mike Engle, Chi...
Vlog: 9/11 Commemoration
Biometric identifiers are now being used as an individual's biometric ID. With security becoming an increasingly important issue, biometrics are the way to go.
What does biometric mean? Biometri...
Biometric ID: Benefits & Risks of Biometric Identification
With the recent introduction of the SCA compliance requirements, authentication is becoming a key player in protecting against fraud and securing payments.
What is Strong Customer Authentication C...
Strong Customer Authentication Compliance
1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss onboarding, ID proofing, and strong customer authentication in this vlog.
Michael Cichon:
Let's welcome Mike Engle, Chief Strategy O...
Vlog: Onboarding, ID Proofing, Strong Customer Authentication
1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss a variety of topics including ransomware and executive orders in their recent vlog.
Michael Cichon:
Hey Mike. Quite a day, huh?
Mike...
Vlog: Pipelines, Executive Orders, and More with Mike Engle
When Brad Smith, Microsoft's President, talks about the SolarWinds attack he certainly doesn't sugarcoat what is now known as the months-long hacking campaign that affected US government agencies a...
Why the SolarWinds Attack Worked...
Today most organizations rely on very old and tired forms of authentication for system access. The combination of username, password, and sometimes a second factor do not prove to you who is at the...