Transitioning From Password Based Authentication to Identity Based Authentication
Passwords really aren’t the problem. It’s anonymous users hiding behind compromised credentials that represent one...
Identity proofing solutions add a level of security to your enterprise and create a better user experience for your employees and customers.
What is identity proofing? Identity proofing is a pro...
What Is Identity Proofing & Verification?
In the first blog of this series, we positioned decentralization of identity as a construct that allowed for preservation of a user’s privacy in stark contrast to the invasion and exponential destr...
Decentralized Identity Management and User Data Sharing
What is Biometric Authentication?
Biometric authentication is the use of physical traits from users to verify their identity when they attempt to access systems or user accounts. In this discussio...
What Is Biometric Authentication? Pros, Cons & Use Cases
Customer identity and access management is the solution your business needs if you’re currently struggling with controlling customer user IDs.
What is CIAM? CIAM is an access management solution...
What is Customer Identity and Access Management (CIAM)?
In this vlog, our CSO, Mike Engle, and CMO, Michael Cichon, discuss marrying ID and authentication.
Michael Cichon:
Good morning, Michael Engle, Chief Strategy Officer at 1Kosmos. Welcome bac...
Vlog: Marrying ID and Authentication
1Kosmos CTO, Rohan Pinto, and CMO, Michael Cichon, discuss the 1Kosmos platform, identity proofing, the NIST guidelines, blockchain technology and more in this vlog.
Michael Cichon:
Hello, Roha...
Vlog: The 1Kosmos Platform with Rohan Pinto
In this vlog, 1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss the 20th anniversary of 9/11 and how the attacks changed our security landscape.
Michael Cichon:
Welcome, Mike Engle, Chi...
Vlog: 9/11 Commemoration
Biometric identifiers are now being used as an individual's biometric ID. With security becoming an increasingly important issue, biometrics are the way to go.
What does biometric mean? Biometri...
Biometric ID: Benefits & Risks of Biometric Identification
As human beings, we have an innate desire to own what we create. Our identity is no different. In the physical world, a person who wants to prove their identity usually does so via a driver’s licen...
Decentralizing Identity for Enhanced User Control
With the recent introduction of the SCA compliance requirements, authentication is becoming a key player in protecting against fraud and securing payments.
What is Strong Customer Authentication C...
Strong Customer Authentication Compliance
New hire fraud is a top concern for Chief Security Officers (CSOs) in most organizations. With the rise of remote work during the COVID-19 pandemic, these concerns have only been exacerbated. Many ...
Is Your New Employee Really Who They Say They Are?
Part 3
In parts 1 and 2 of this series I discussed the transition underway in the IAM industry to passwordless authentication and the reasons why 1Kosmos has taken the path to passwordless throu...
Identity Based Authentication: Conflux of ID & Authentication
Part 2
In part 1, I provided some needed context for moving from passwords to identity for user authentication. Now, let’s take a deeper look, and we’ll start with identity in the offline world....
Identity Based Authentication- Eliminating Passwords
Part 1
There seems to come a point in time when all industries hit an inflection point - where the old ways of doing things cede to the new.
We’ve reached this point in Identity and access ma...
Identity Based Authentication – The Transformation of IAM
Today we relaunched the 1Kosmos brand at a time when both business and government leaders are demanding improved security against cyber threats while international gangs feast on ransomware, data b...
1Kosmos Relaunch: How 1Kosmos Protects Identity from Attack
What is an Identity Verification System?
An identity verification systems is a type of software that ensures a person is who they claim to be; for businesses, user identities need to be verified t...
Identity Verification Systems Explained
Voice authentication makes logins as easy as speaking. This may sound futuristic, but it's the security that's saving businesses from breaches every day.
Is voice recognition secure? Yes, voice ...
Voice Authentication: How It Works & Is It Secure?
1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss onboarding, ID proofing, and strong customer authentication in this vlog.
Michael Cichon:
Let's welcome Mike Engle, Chief Strategy O...
Vlog: Onboarding, ID Proofing, Strong Customer Authentication
1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss a variety of topics including ransomware and executive orders in their recent vlog.
Michael Cichon:
Hey Mike. Quite a day, huh?
Mike...
Vlog: Pipelines, Executive Orders, and More with Mike Engle
The Old Way: Friction Filled Authentication
In today’s digital world, most of us face authentication problems on a daily basis. Whether your records were some of the 37 billion that were compromis...
Introducing the 1Kosmos Appless Feature
A random jumble of letters is a secure password, but will you remember it? Password management can secure your account without memorizing these long passwords.
What is Password Management?
Passwo...
Guide to Password Management for Employees
1Kosmos CTO, Rohan Pinto, and CMO, Michael Cichon, discuss appless authentication in this recent vlog.
Michael Cichon:
All right, welcome Rohan Pinto, chief technology officer at 1Kosmos. It's ...
Vlog: Appless Authentication
Biometric password: making you the password. Here’s how biometric logins are more secure and remove the need to memorize a password.
What is a biometrics login? A biometric login uses an individ...