Colonial Pipeline Attack: An Identity Management Nightmare
You’ve probably seen the latest authentication and identity management nightmare sweeping the US: the Colonial Pipeline attack. In case y...
The Challenge of Identity Management
Identity management has been a challenge for individuals and organizations for years, especially in the digital world. One individual may have a different digi...
1Kosmos BlockID’s NIST 800-63-3 Conformant & FIDO2 Certification Enhances Security with Fully Proofed Users
An authentication and identity management nightmare...?
It’s been all over the news in the last twenty-four hours: An increasing number of gas stations on the East Coast are without fuel! About 15...
The Reality Behind the Colonial Pipeline Attack
Identity Management vs. Decentralized Identity
What exactly does identity management mean? Broadly, it is defined as tools that help companies manage the access rights of all of their employees....
How Can Decentralized Identity Help With Identity Management?
Passwordless Authentication Makes 1Kosmos the Most Advanced Startup
Passwordless authentication is one of the top features that led Alestra to call 1Kosmos the “most advanced startup” in their 5th...
1Kosmos Is Selected for the Alestra NAVE Program
Why is having a digital identity important? It simply puts data back in the hands of users. Here are some startling facts about a world without digital identity:
I have no choice but to share ...
Digital Identity: The Future of Identity
What is the most important piece of information to know when you are securing a financial transaction, launching a nuclear weapon, or simply onboarding a new employee? The answer is that you absolu...
Why Is Authentication Important?
Passwords have been used to access computers since 1961 when an operating system at the Massachusetts Institute of Technology first required login credentials. 60 years later, despite the massive a...
The Benefits of Passwordless Authentication
How Did Cybersecurity Investments Fare in 2020?
Nearly every industry in the world has drastically changed in the last year, with finance being no exception. Although investment spending decreas...
Trends in Cybersecurity Funding and Investment
HR managers say the top three biggest challenges they face with onboarding are inconsistencies in application across the organization (44 percent), competing priorities (39 percent), and measuring ...
Employee Onboarding: Eliminate Identity Compromises
Zero Trust is a buzzword with which cybersecurity folks are quite familiar. I understand, you’re surprised. Zero Trust has nothing to do with the Amazon packages your spouse hides from you. Rather,...
Zero Trust: Don’t Believe the Hyp(r)e!
When Brad Smith, Microsoft's President, talks about the SolarWinds attack he certainly doesn't sugarcoat what is now known as the months-long hacking campaign that affected US government agencies a...
Why the SolarWinds Attack Worked…
Identity service providers create, maintain, and manage identity information for users and also provide authentication services to relying applications within a federation or distributed network. T...
The Gap Identity Service Providers Must Fill
Today, I’m pleased to announce that my new venture 1Kosmos is exiting stealth mode with a $15 million investment from ForgePoint Capital. With this Series A funding and our brand-new advisory board...
Why 1Kosmos is set to fill a Void in Cybersecurity & Digital Economy
Long before the COVID-19 pandemic, employees used their work devices to check their social or news notifications while on break. Now, the lines between personal and work uses are even more blurred ...
About Gartner’s 5 Key Predictions for IAM and Fraud Detection
Still today, the number one security problem pertains to identity and passwords.
More than 80 percent of data breaches that have occurred in the last ten years involve brute-force or the utilizati...
About Gartner’s Top Security Projects for 2021
Phishing, smishing, vishing... Outside of haunting CISOs day and night, what’s the difference? Well, phishing can be considered the parent of them all. It involves sending targeted email messages t...
The Bulletproof Solution to Prevent Vishing Attacks
Reality has just caught up with us. The new COVID-19 variants (there seems to be a new one every week since the beginning of the year) is spreading around the world at a worrisome pace. Most wester...
Remote Access Challenges and The Solution
It’s already mid-January and Google has been filled with references to web pages ranking what is supposedly the best to come in 2021 for a multitude of things. Spoiler alert: this blog isn’t about ...
2021 Top-5 Cyber Security Priorities
We’ve all been exposed to social logins. Social logins allow users like you and me to access websites or create accounts on websites by using existing social account credentials that we’ve already ...
Social Logins: The Other Side of The Coin
As much as Bud Fox, under the alias “Blue Horseshoe,” shared his love for Anacott Steel on the phone with a Wall Street reporter with the hope of manipulating the markets, there is one industry tha...
When Fintech and Cyber Attacks Walk Hand in Hand
How does your organization onboard a new employee?
I’m not talking about the distribution of the corporate booklet that brags about the socially responsible stance the company takes in the commu...
New Employee Onboarding: A Hacker’s Dream
Last night I woke with a start, sweating heavily. I dreamed that Facebook had contacted me to ask if they could sell Amazon some of the data I shared to create an account along with some behavioral...
Decentralized Identity – Should you (really) own your Identity?
Once a vaccine for COVID-19 becomes available for use in the United States, officials will start the process of delivering doses to states, counties and cities and will oversee their administration...