FedRAMP Moderate Authorization: Why It Matters for Government Security
FedRAMP Levels Explained & Compared (with Recommendations)
At 1Kosmos, we believe that technology, when put to good use, has the power to transform lives and communities. That’s why, when Bell Canada, one of our valued customers and a longstanding champion...
Driving Change Together: 1Kosmos Sponsors Bell Canada’s Golf Tournament Supporting Kids Help Phone
A pair of British retail giants are still scrambling to regain control of their computer systems nearly a month after massive cyberattacks disrupted their operations and cast a spotlight on the dan...
‘Spider’ Strikes Britain: The Hacks at M&S, Co-Op & How to Stop Them
Given the stunning success of the recent hacks at MGM and Caesars, it's a safe bet what happened in Vegas won't stay there for long. Even though technology to prevent such breaches is readily avail...
MGM, Caesars Hacks: More of the Same Is Coming Your Way–But Here’s How to Stop It
What if the key to your hotel room was suddenly useless, and your personal information was floating in the digital ether? This happened after the recent MGM Resorts cyberattack; the vulnerabilities...
Unmasking the MGM Resorts Cyber Attack: Why Identity-Based Authentication is the Future
Discover how 1Kosmos enhances Microsoft Entra ID with seamless identity-based authentication and passwordless access. Learn about new external authentication methods and how they empower organizati...
Vlog: How 1Kosmos Can Be An External Authentication Method When Using Microsoft Entra ID?
In today's fast-paced digital world, efficient and secure user onboarding is a crucial aspect of any organization's IT strategy. Imagine users maintaining countless account credentials to log in to...
Streamlining Self-Service User Onboarding with 1Kosmos MFA Integration
In a hybrid world that blends on-premises and cloud-based resources, securing access to sensitive data and systems is no longer achieved by defending a perimeter, but through authentication. While ...
Four Ways to Align Authentication with Business Needs
How secure are you in a world where data breaches and cyber-attacks make headlines daily? You might think you're doing enough if you've already upgraded to Two-Factor Authentication (2FA). However,...
What Is 3FA (Three-Factor Authentication)?
Join Robert MacDonald, VP of Product Marketing at 1Kosmos, and Vikram Subramanian, VP of Solutions, as they explore the integration of 1Kosmos with Microsoft Entra, enabling passwordless authentica...
Vlog: Why 1Kosmos and Microsoft Entra Are Better Together
Recently, the cybersecurity world was rocked by another significant breach, this time involving Snowflake, a major player in the data storage and analysis industry. The breach, orchestrated by the ...
Understanding the Snowflake Data Breach and Its Implications
Are you still relying on traditional passwords to authenticate users, even while cyber threats grow more sophisticated today? This article will examine passkey authentication work, a modern digital...
What are Passkeys and How Do They Work?
Join Michael Cichon, CMO, and Mike Engle, CSO of 1Kosmos, as they introduce 1Key, a groundbreaking biometric authentication solution. Learn how 1Key eliminates passwords and mobile devices, offerin...
Vlog: Introducing the 1Kosmos 1Key Biometric Security Key
In the ever-evolving landscape of cybersecurity, Multi-Factor Authentication (MFA) stands as a critical defense mechanism. Gartner's recent report, "Seven Tracks to a Mature MFA Implementation," wr...
Navigating Gartner’s Seven Tracks to MFA Maturity with 1Kosmos
The team here at 1Kosmos is excited to announce the release of 1Kosmos 1Key, a phishing-resistant biometric security key that supports authentication for unlimited users per device. The 1Key reduce...
Unlocking the Future of Secure Authentication for Shared Workstations with 1Kosmos 1Key
Watch our latest vlog for an insightful conversation between Michael Cichon, Chief Marketing Officer at 1Kosmos, and Siddharth Gandhi, Chief Operating Officer of the Asia Pacific region. In this vi...
Vlog: How the Reserve Bank of India Guidelines Align with 1Kosmos
The recent ransomware attack on Change Healthcare, a major healthcare technology company, has once again highlighted the critical importance of robust identity verification and authentication measu...
Lessons Learned From the Recent Change Healthcare Ransomware Attack and How to Prevent Similar Breaches
Discover the simplicity and security of magic link authentication in this article. We dive into how magic links work, providing a hassle-free and secure alternative to traditional passwords. By exp...
Magic Links Demystified: Simplifying and Securing User Logins
Ensuring the safety of sensitive data and privacy shifts from just a priority to an absolute necessity. Authentication, the gatekeeper of these digital resources, is crucial in this fight against c...
Understanding Step Up Authentication: From Basics to Benefits
Identity and Access Management (IAM) is crucial in managing and authenticating users and securing access to organizational resources. IAM involves identifying users in a system and controlling thei...
The Truth About Passwordless IAM Authentication
Recent reports from the FBI have shed light on the escalating cyber espionage activities orchestrated by state-sponsored actors, particularly those emanating from China. Case in point -- the emerge...
Strengthening Cybersecurity in the Face of Rising Threats
Join Rob MacDonald, VP of Product Marketing, and Huzefa Olia, COO of 1Kosmos, as they unveil the exciting integration news with Amazon Cognito. Learn about the significance of 1Kosmos becoming an A...