Identification is only one part of the detection process; add in authentication and you can strongly guarantee a user is who they truly claim to be.
How Does Identity Authentication Work?
Verifyi...
Curious about passwordless authentication? Wondering how it can create a more secure login? We'll walk you through what it is and how it works in an enterprise.
Is passwordless authentication sa...
Guide to Passwordless Authentication
During this year’s RSA conference, 1Kosmos was named a Global InfoSec Awards winner in the Next-Gen in Blockchain Security category by Cyber Defense Magazine (CDM), the industry’s leading electroni...
1Kosmos Wins Global InfoSec Award During RSA Conference 2021
The Colonial Pipeline Attack: An Authentication Crisis
If you live on the east coast of the United States, you are probably still facing the consequences of the Colonial Pipeline Attack: scramblin...
Could CEOs Face Criminal Charges for Negligent Cybersecurity Standards?
Colonial Pipeline Attack: An Identity Management Nightmare
You’ve probably seen the latest authentication and identity management nightmare sweeping the US: the Colonial Pipeline attack. In case y...
VPN and Virtual Desktop Security: How Going Passwordless Could Have Prevented the Colonial Pipeline Attack
The Challenge of Identity Management
Identity management has been a challenge for individuals and organizations for years, especially in the digital world. One individual may have a different digi...
1Kosmos’s NIST 800-63-3 Conformant & FIDO2 Certification Enhances Security with Fully Proofed Users
An authentication and identity management nightmare...?
It’s been all over the news in the last twenty-four hours: An increasing number of gas stations on the East Coast are without fuel! About 15...
The Reality Behind the Colonial Pipeline Attack
Identity Management vs. Decentralized Identity
What exactly does identity management mean? Broadly, it is defined as tools that help companies manage the access rights of all of their employees....
How Can Decentralized Identity Help With Identity Management?
Passwordless Authentication Makes 1Kosmos the Most Advanced Startup
Passwordless authentication is one of the top features that led Alestra to call 1Kosmos the “most advanced startup” in their 5th...
1Kosmos Is Selected for the Alestra NAVE Program
Why is having a digital identity important? It simply puts data back in the hands of users. Here are some startling facts about a world without digital identity:
I have no choice but to share ...
Digital Identity: The Future of Identity
What is the most important piece of information to know when you are securing a financial transaction, launching a nuclear weapon, or simply onboarding a new employee? The answer is that you absolu...
Why Is Authentication Important?
Passwords have been used to access computers since 1961 when an operating system at the Massachusetts Institute of Technology first required login credentials. 60 years later, despite the massive a...
The Benefits of Passwordless Authentication
How Did Cybersecurity Investments Fare in 2020?
Nearly every industry in the world has drastically changed in the last year, with finance being no exception. Although investment spending decreased...
Trends in Cybersecurity Funding and Investment
HR managers say the top three biggest challenges they face with onboarding are inconsistencies in application across the organization (44 percent), competing priorities (39 percent), and measuring ...
Employee Onboarding: Eliminate Identity Compromises
Zero Trust is a buzzword with which cybersecurity folks are quite familiar. I understand, you’re surprised. Zero Trust has nothing to do with the Amazon packages your spouse hides from you. Rather,...
Zero Trust: Don’t Believe the Hyp(r)e!
When Brad Smith, Microsoft's President, talks about the SolarWinds attack he certainly doesn't sugarcoat what is now known as the months-long hacking campaign that affected US government agencies a...
Why the SolarWinds Attack Worked…
Identity service providers create, maintain, and manage identity information for users and also provide authentication services to relying applications within a federation or distributed network. T...
The Gap Identity Service Providers Must Fill
Today, I’m pleased to announce that my new venture 1Kosmos is exiting stealth mode with a $15 million investment from ForgePoint Capital. With this Series A funding and our brand-new advisory board...
Why 1Kosmos is set to fill a Void in Cybersecurity & Digital Economy
Long before the COVID-19 pandemic, employees used their work devices to check their social or news notifications while on break. Now, the lines between personal and work uses are even more blurred ...
About Gartner’s 5 Key Predictions for IAM and Fraud Detection
Still today, the number one security problem pertains to identity and passwords.
More than 80 percent of data breaches that have occurred in the last ten years involve brute-force or the utilizati...
About Gartner’s Top Security Projects for 2021
Phishing, smishing, vishing... Outside of haunting CISOs day and night, what’s the difference? Well, phishing can be considered the parent of them all. It involves sending targeted email messages t...
The Bulletproof Solution to Prevent Vishing Attacks
Reality has just caught up with us. The new COVID-19 variants (there seems to be a new one every week since the beginning of the year) is spreading around the world at a worrisome pace. Most wester...
Remote Access Challenges and The Solution
It’s already mid-January and Google has been filled with references to web pages ranking what is supposedly the best to come in 2021 for a multitude of things. Spoiler alert: this blog isn’t about ...
2021 Top-5 Cyber Security Priorities
We’ve all been exposed to social logins. Social logins allow users like you and me to access websites or create accounts on websites by using existing social account credentials that we’ve already ...