Modern threats are evolving rapidly in both scope and scale. Hackers are targeting governments and businesses alike with increasing sophistication.
What is an APT? It’s a complex, long-term atta...
Modern authentication has involved the use of biometric data for years. However, maintaining privacy without sacrificing security has remained a challenge.
What is biometric encryption? Biometri...
What is Biometric Encryption?
Biometrics have come a long way, but the humble fingerprint scan still provides excellent security for enterprise systems.
What is Fingerprint Authentication? It uses the unique characteristics ...
How Fingerprint Biometric Authentication Works
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos CSO, Mike Engle, to discuss how digital identity can modernize healthcare. If you are interested in learning more about this topic, p...
The Role of Digital Identity in Modernizing Health Care
The Importance of Digital Identity and Wallets in Healthcare
Traditional processes in today's healthcare landscape have left sensitive personal information scattered across a lifetime of providers...
The Importance of Digital Identity in Healthcare
Authentication is a constant challenge for enterprise organizations managing teams accessing system resources from anywhere, at any time. New technologies are leveraging mobile devices to address t...
What Is Push Authentication (2FA)?
Encryption is the foundation of modern Internet security. Data cannot move safely and securely across the public Internet without it. However, not all forms of encryption are made equal.
What is A...
What is Symmetric vs Asymmetric Encryption?
Which type of phishing attack can cost your company millions? Understanding different attacks can help protect against them and could boost your bottom line.
What Are the Types of Phishing Attacks...
10 Common Types of Phishing Attacks With Examples
In this vlog, 1Kosmos' Product Manager, Sheetal Elangovan, joins 1Kosmos' CMO, Michael Cichon, to discuss how employee onboarding can be fixed with document verification and identity based authenti...
How to Fix Onboarding With Document Verification and Identity Based Authentication
A SIM swapping scam can not only take over your phone but can also become detrimental to your financial health as scammers can steal bank logins or data.
What does SIM swapping do? SIM swapping ...
What Is SIM Swapping? How To Protect Against This Scam
In this vlog, our CMO, Michael Cichon, is joined by our CSO, Mike Engle, to discuss how digital identity verification can be used to combat synthetic identity fraud and account takeover. If you are...
Combatting Synthetic Identity Fraud and Account Takeover With Digital Identity Verification
SAML and SSO work together to create a more accessible and more secure login for users. But how, exactly, do these methods work?
What is SAML SSO? SAML is an overarching standard that includes s...
What is SAML & How Does SSO Authentication Work?
In this vlog, our VP of Product Marketing, Robert MacDonald, sat down with our CMO, Michael Cichon to chat about his experience at the 2022 FIDO Authenticate conference. He also gives insights into...
Authenticate 2022: How Web 3.0 Will Reshape Authentication
SAML SSO vs. LDAP can be challenging to parse out. Still, we go through both methods to help clear up the differences and help you decide which to use.
Is SSO possible with LDAP? Yes, SSO is pos...
SAML SSO vs LDAP: Differences & Definitions Explained
While zero trust implementation can advance your security, you may want to know of the best practices to really get the most out of your zero trust framework.
What are the main concepts of zero ...
5 Zero Trust Best Practices for Implementation
SSO Protocols can be extremely helpful in your organization as it cuts down on time spent on logins, but how do you choose which protocol to use?
What is SSO? SSO stands for Single Sign-On (SSO)...
What Are Single Sign-On (SSO) Protocols?
As someone who's spent a career leading financial operations for successful cybersecurity startups such as Attivo Networks and Cloudmark, I knew it would be hard to resist an invitation from 1Kosmo...
3 Reasons I Joined 1Kosmos: Jilbert Washten
As we close the celebration of the 19th annual Cybersecurity Awareness Month this October, it’s an ideal time to focus on the need to improve all cybersecurity measures by eliminating passwords and...
Celebrating the 19th Annual Cybersecurity Awareness Month
While NIST's Cybersecurity Framework is probably the most well-known, there are other cybersecurity frameworks your organization should be aware of.
What is a cybersecurity framework? A cybersec...
Cybersecurity Framework & NIST: What You Need to Know
The principle of least privilege is meant to limit user access to protect the organization's information from being hacked or leaked.
What is the principle of least privilege?
The Principle o...
What Is the Principle of Least Privilege (POLP)?
OIDC vs. SAML: What's the Difference?
Security Assertion Markup Language (SAML) vs. OpenID Connect (OIDC): It can be challenging to choose between the two and decide which is best for business.
...
OIDC vs SAML: What’s the Difference?
In this vlog, Mike Engle and Michael Cichon discuss how government agencies can securely deliver digital services to their constituents.
https://player.vimeo.com/video/761643613
&nb...
How to Preserve Privacy While Delivering Digital Government Services
RBAC, ABAC, and PBAC are all access controls that can help keep certain information or systems restricted to those based on user, environment, role and more.
What do RBAC, ABAC and PBAC stand fo...
RBAC vs ABAC vs PBAC: Access Control Uses & Definitions
Contractor Fraud and the Rise of Remote Work
Many organizations require the use of contractors, known as third parties. Managing these non-employees through the HR system, the authoritative identi...