There is a classic juxtaposition within security controls. Organizations need to make data and services available, but if it’s too easily accessible, too open, then a data breach can occur. On the ...
Problems with Passwords
Are passwords the weakest link in cybersecurity? We all know that it is risky to authenticate workers, citizens, and customers with passwords. The proof is in the seemingly...
3 Key Considerations in Your Passwordless Journey
What is Blockchain Verification & Validation?
Modern network infrastructure is turning towards decentralized models of record keeping. Authentication and identity management are no different.
...
What is Blockchain Verification & Validation?
Modern identity management relies on multi-factor authentication to maintain account security above and beyond simple passwords. One-Time Passwords (OTPs) are a vital part of this effort.
What a...
What Is a Time-Based One-Time Password (TOTP)?
It's 2023—do you know what your identity is doing? As the adoption of digital channels continues to be matched by corresponding levels of fraud, the ability to achieve digital identity verification...
6 Digital Identity Predictions for 2023
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos Director of Solutions Engineering, Jay Baskar, to discuss how to deploy passwordless authentication across a diverse IT environment. ...
How to Deploy Passwordless Authentication Across a Diverse IT Environment
With the EU becoming a major economic player, its rules and regulations are being felt around the business world.
What is GDPR? GDPR is a set of regulations specific to businesses in the EU gove...
7 Core Principles for GDPR Data Protection
Online, always-on finance and banking have led to significant security challenges for institutions trying to thwart international terrorism, identity theft, and fraud.
What are KYC regulations? ...
What Is KYC (Know Your Customer) For Banking?
Modern cyber threats require dynamic and evolving security countermeasures, especially regarding authentication.
What is adaptive authentication? It is a dynamic, risk-based approach to authenti...
What is Adaptive Authentication and Authorization?
Modern threats are evolving rapidly in both scope and scale. Hackers are targeting governments and businesses alike with increasing sophistication.
What is an APT? It’s a complex, long-term atta...
What Is An Advanced Persistent Threat (APT)?
Modern authentication has involved the use of biometric data for years. However, maintaining privacy without sacrificing security has remained a challenge.
What is biometric encryption? Biometri...
What is Biometric Encryption?
Biometrics have come a long way, but the humble fingerprint scan still provides excellent security for enterprise systems.
What is Fingerprint Authentication? It uses the unique characteristics ...
How Fingerprint Biometric Authentication Works
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos CSO, Mike Engle, to discuss how digital identity can modernize healthcare. If you are interested in learning more about this topic, p...
The Role of Digital Identity in Modernizing Health Care
The Importance of Digital Identity and Wallets in Healthcare
Traditional processes in today's healthcare landscape have left sensitive personal information scattered across a lifetime of providers...
The Importance of Digital Identity in Healthcare
Authentication is a constant challenge for enterprise organizations managing teams accessing system resources from anywhere, at any time. New technologies are leveraging mobile devices to address t...
What Is Push Authentication (2FA)?
Encryption is the foundation of modern Internet security. Data cannot move safely and securely across the public Internet without it. However, not all forms of encryption are made equal.
What is...
What is Symmetric vs Asymmetric Encryption?
Which type of phishing attack can cost your company millions? Understanding different attacks can help protect against them and could boost your bottom line.
What are the top types of phishing a...
10 Common Types of Phishing Attacks With Examples
In this vlog, 1Kosmos' Product Manager, Sheetal Elangovan, joins 1Kosmos' CMO, Michael Cichon, to discuss how employee onboarding can be fixed with document verification and identity based authenti...
How to Fix Onboarding With Document Verification and Identity Based Authentication
Enabling biometrics with FIDO can help create more security for your logins and reduces the risk of login attacks from succeeding.
What is FIDO biometrics? FIDO biometrics are a way to authentic...
How To Use Biometrics with FIDO
A SIM swapping scam can not only take over your phone but can also become detrimental to your financial health as scammers can steal bank logins or data.
What does SIM swapping do? SIM swapping ...
What Is SIM Swapping? How To Protect Against This Scam
In this vlog, our CMO, Michael Cichon, is joined by our CSO, Mike Engle, to discuss how digital identity verification can be used to combat synthetic identity fraud and account takeover. If you are...
Combatting Synthetic Identity Fraud and Account Takeover With Digital Identity Verification
SAML and SSO work together to create a more accessible and more secure login for users. But how, exactly, do these methods work?
What is SAML SSO? SAML is an overarching standard that includes s...
What is SAML & How Does SSO Authentication Work?
In this vlog, our VP of Product Marketing, Robert MacDonald, sat down with our CMO, Michael Cichon to chat about his experience at the 2022 FIDO Authenticate conference. He also gives insights into...
Authenticate 2022: How Web 3.0 Will Reshape Authentication
SAML SSO vs. LDAP can be challenging to parse out. Still, we go through both methods to help clear up the differences and help you decide which to use.
Is SSO possible with LDAP? Yes, SSO is pos...