Recent reports from the FBI have shed light on the escalating cyber espionage activities orchestrated by state-sponsored actors, particularly those emanating from China. Case in point -- the emerge...
Join Rob MacDonald, VP of Product Marketing, and Huzefa Olia, COO of 1Kosmos, as they unveil the exciting integration news with Amazon Cognito. Learn about the significance of 1Kosmos becoming an A...
Vlog: 1Kosmos Adds Passwordless Authentication to Amazon Cognito
Less than a month into 2024 and password spraying is being named as the origin for our first eye-opening cyber-attack. In a blog post, Microsoft has identified Midnight Blizzard, the Russian state-...
Mitigating Midnight Blizzard’s Password Spraying Cyber Attack: Insights and Solutions by 1Kosmos
Multi-factor authentication (MFA) has emerged as a pivotal tool in cybersecurity, a security key to bolstering the fortifications guarding sensitive information and systems. Essential to comprehend...
What is MFA Fatigue and How Can Your Business Combat it?
What is FIDO Passwordless Authentication?
Fast Identity Online (FIDO) is an advanced security protocol that seeks to eliminate the need for passwords, moving towards a more secure and user-friendl...
Unleashing the Power of FIDO Passwordless Authentication with 1Kosmos BlockID
Have you ever wondered how a small piece of plastic could be your key to enhanced security and operational efficiency? This article dives into the intricacies of smart card technology, a robust sol...
Understanding Smart Card Authentication
"Fast" and "frictionless" onboarding for customers, workers and citizens is an elusive goal. Sure, identity verification is crucial, but so is verifying claims such as educational qualifications, a...
Trust and Verify–Why Reusable Verified Credentials Are So Essential to Modern IAM
Businesses face an ever-expanding array of cyber threats. Phishing, the deceptive practice of tricking individuals into divulging sensitive information, sits prominently at the top. It's not just a...
What Is Phishing Resistant MFA and How Can You Implement It?
In the wake of the hack at MOVEit and far too many other organizations this year, the secure, user-controlled, privacy-preserving benefits of distributed ledger technology (DLT) make it a critical ...
The Immutable “Chain of Custody” – Why Distributed Ledger is Critical to Modern IAM
While Identity and Access Management (IAM) long ago gave IT teams tighter controls against unauthorized access to digital services, it hasn't exactly been bulletproof.
Yes, IAM consolidated the ...
Ditching the ‘Feds’: Why Decentralized Digital Identity is Key to Effective IAM
I am very excited to announce that 1Kosmos is an official AWS Cognito Passwordless MFA partner.
Amazon Cognito places the utmost importance on online account security. To bolster the protection ...
Bringing 1Kosmos Passwordless Security to AWS Cognito
With credential stuffing attacks on 23andM and Okta just the latest breaches to make headlines in recent weeks, the push for biometrics-based authentication is gaining momentum for Identity and Acc...
Possession Is Nine-Tenths of the Flaw: Why Device-based Biometrics Don’t Cut It for IAM
Dive into the dynamic world of digital identity with Rob MacDonald, VP of Product Marketing, and Huzefa Olia, Co-founder and COO, in our latest vlog! Join this insightful conversation as they unpac...
Vlog: What the UK Government Digital Identity and Attributes Trust Framework Certification Means for 1Kosmos
PCI DSS version 4.0 is the latest iteration of the Payment Card Industry Data Security Standard, released on March 31, 2022, and is currently in effect. The previous version, PCI DSS version 3.2.1,...
Are You Ready for PCI DSS Version 4.0?
Demands by residents for contactless services have accelerated the need for digital government services, but rampant identity fraud is impeding digital transformation and costing taxpayers millions...
Securing Digital Government Services with Credential Service Providers
For far too many organizations, Identity and Access Management (IAM) has become a study in locking the storm window while leaving the front door wide open. From MGM to Facebook to T-Mobile and beyo...
What a Difference Identity Makes: Why IAM Keeps Falling Short–and How to Fix It
Identity Governance is a beacon for organizations aiming to maintain regulatory compliance, safeguard operations and boost efficiency. Let's demystify this term: Identity Governance, tailored for o...
Identity Governance for Organizations: A Step-by-Step Guide to Implementation and Best Practices
A Distributed Ledger stands at the forefront of modern database technology, a shared database spread across many sites, countries, or institutions. This innovative approach to data management recor...
Distributed Ledger: A Comprehensive Insight for Organizations
A new method for controlling and confirming digital identities is emerging: distributed digital identity (DDI). By removing the need for a single authoritative source, DDI empowers users to take ch...
Distributed Digital Identity: A Transformative Guide for Organizations
Whether it's Henry the Navigator leading The Age of Discovery or Cristiano Ronaldo nailing a mid-air pirouette on the football field, Portugal has long been home to game-changing innovation—and dig...
Digital Identity Spotlight: Portugal
Join Rob MacDonald, VP of Product Marketing, and Mike Engle, Co-founder of 1Kosmos, as they discuss the recent cyber attack on MGM and explore the world of vishing (voice phishing) in this informat...
Identity Based Authentication: The Key to Preventing Future MGM-Style Attacks
Given the stunning success of the recent hacks at MGM and Caesars, it's a safe bet what happened in Vegas won't stay there for long. Even though technology to prevent such breaches is readily avail...
MGM, Caesars Hacks: More of the Same Is Coming Your Way–But Here’s How to Stop It
What if the key to your hotel room was suddenly useless, and your personal information was floating in the digital ether? This happened after the recent MGM Resorts cyberattack; the vulnerabilities...
Unmasking the MGM Resorts Cyber Attack: Why Identity-Based Authentication is the Future
In the ever-evolving landscape of cybersecurity, it's crucial to stay up to date with the latest innovations and technologies designed to enhance online security. One such innovation that has gaine...