In the ever-evolving landscape of cybersecurity, Multi-Factor Authentication (MFA) stands as a critical defense mechanism. Gartner's recent report, "Seven Tracks to a Mature MFA Implementation," wr...
The team here at 1Kosmos is excited to announce the release of 1Kosmos 1Key, a phishing-resistant biometric security key that supports authentication for unlimited users per device. The 1Key reduce...
Unlocking the Future of Secure Authentication for Shared Workstations with 1Kosmos 1Key
Join Michael Cichon, CMO at 1Kosmos, and Vikram Subramaniam, VP of Solutions, as they delve into the alarming rise of deepfakes. Discover how this evolving technology threatens security and authent...
Vlog: Defeating Deepfakes
Watch our latest vlog for an insightful conversation between Michael Cichon, Chief Marketing Officer at 1Kosmos, and Siddharth Gandhi, Chief Operating Officer of the Asia Pacific region. In this vi...
Vlog: How the Reserve Bank of India Guidelines Align with 1Kosmos
As a leading provider of identity management solutions, 1Kosmos is excited to announce our new capability as a Credential Service Provider (CSP) for government agencies. This development represents...
Elevating Government Digital Transformation with an Advanced Credential Service Provider
The recent ransomware attack on Change Healthcare, a major healthcare technology company, has once again highlighted the critical importance of robust identity verification and authentication measu...
Lessons Learned From the Recent Change Healthcare Ransomware Attack and How to Prevent Similar Breaches
Traditional identity verification methods show their age, often proving susceptible to data breaches and inefficiencies. Blockchain emerges as a beacon of hope in this scenario, heralding a new era...
Blockchain Identity Management: A Complete Guide
As society becomes more reliant on technology, the protection of confidential data increases. One innovative way organizations are keeping information safe is through fingerprint biometrics. In thi...
Behind Fingerprint Biometrics: How It Works and Why It Matters
Discover the simplicity and security of magic link authentication in this article. We dive into how magic links work, providing a hassle-free and secure alternative to traditional passwords. By exp...
Magic Links Demystified: Simplifying and Securing User Logins
Ensuring the safety of sensitive data and privacy shifts from just a priority to an absolute necessity. Authentication, the gatekeeper of these digital resources, is crucial in this fight against c...
Understanding Step Up Authentication: From Basics to Benefits
Identity and Access Management (IAM) is crucial in managing and authenticating users and securing access to organizational resources. IAM involves identifying users in a system and controlling thei...
The Truth About Passwordless IAM Authentication
In our digital era, presentation, and injection biometric attacks pose an unprecedented threat to the sanctity of identity verification. As we navigate a landscape increasingly dependent on digital...
Defeating AI-Generated Deepfake Biometric Attacks
Biometric spoofing, also known as biometric spoof attacks or biometric presentation attacks, refers to the manipulation or falsification of biometric data to deceive a biometric authentication syst...
Combatting Biometric Spoofing
Recent reports from the FBI have shed light on the escalating cyber espionage activities orchestrated by state-sponsored actors, particularly those emanating from China. Case in point -- the emerge...
Strengthening Cybersecurity in the Face of Rising Threats
Join Rob MacDonald, VP of Product Marketing, and Huzefa Olia, COO of 1Kosmos, as they unveil the exciting integration news with Amazon Cognito. Learn about the significance of 1Kosmos becoming an A...
Vlog: 1Kosmos Adds Passwordless Authentication to Amazon Cognito
Less than a month into 2024 and password spraying is being named as the origin for our first eye-opening cyber-attack. In a blog post, Microsoft has identified Midnight Blizzard, the Russian state-...
Mitigating Midnight Blizzard’s Password Spraying Cyber Attack
Multi-factor authentication (MFA) has emerged as a pivotal tool in cybersecurity, a security key to bolstering the fortifications guarding sensitive information and systems. Essential to comprehend...
What is MFA Fatigue and How Can Your Business Combat it?
What is FIDO Passwordless Authentication?
Fast Identity Online (FIDO) is an advanced security protocol that seeks to eliminate the need for passwords, moving towards a more secure and user-friendl...
Unleashing the Power of FIDO Passwordless Authentication with 1Kosmos
Have you ever wondered how a small piece of plastic could be your key to enhanced security and operational efficiency? This article dives into the intricacies of smart card technology, a robust sol...
Understanding Smart Card Authentication
"Fast" and "frictionless" onboarding for customers, workers and citizens is an elusive goal. Sure, identity verification is crucial, but so is verifying claims such as educational qualifications, a...
Why Reusable Verified Credentials Are So Essential to Modern IAM
Businesses face an ever-expanding array of cyber threats. Phishing, the deceptive practice of tricking individuals into divulging sensitive information, sits prominently at the top. It's not just a...
What Is Phishing Resistant MFA and How Can You Implement It?
In the wake of the hack at MOVEit and far too many other organizations this year, the secure, user-controlled, privacy-preserving benefits of distributed ledger technology (DLT) make it a critical ...
The Immutable “Chain of Custody” – Why Distributed Ledger is Critical to Modern IAM
While Identity and Access Management (IAM) long ago gave IT teams tighter controls against unauthorized access to digital services, it hasn't exactly been bulletproof.
Yes, IAM consolidated the ...
Ditching the ‘Feds’: Why Decentralized Digital Identity is Key to Effective IAM
I am very excited to announce that 1Kosmos is an official AWS Cognito Passwordless MFA partner.
Amazon Cognito places the utmost importance on online account security. To bolster the protection ...