Passwords are becoming a thing of the past with biometrics taking over. But what does this mean for security, and what types of biometrics can be used?
What are examples of biometrics? Some exam...
What is passport scanning? Is there a convenient way to securely scan passports remotely? Our CSO, Mike Engle, joins our CMO, Michael Cichon, to answer these questions and more in their recent vlog...
Is There a Secure Way to Scan Passports Remotely?
As an information security standard, ISO 27001 can be beneficial to understand and comply with, but what exactly is ISO 27001?
What does ISO 27001 mean? ISO 27001 is a regulation for Information...
What is ISO 27001: Information Security Standard?
What are behavioral biometrics? Behavioral biometrics analyzes a user's physical movements and patterns while partaking in certain activities like typing, walking or even how much pressure is used ...
What Is Behavioral Biometric Authentication?
Looking to implement zero trust in your organization but don't know where to start? Keep reading to find the best way to get a zero-trust model up and running.
What is zero trust? Zero trust is ...
How to Implement a Zero Trust Security Model
What is fingerprint verification? Fingerprint verification uses a fingerprint scan to identify and verify that a user is who they say they are. Fingerprint authentication is the most popular way to...
Fingerprint Verification: How Does It Work?
As the teenager taking credit for last week's Uber hack so ably demonstrated, threat actors have found an unlikely accomplice in multifactor authentication. But how did cyberattackers manipulate MF...
Uber Hack: MFA Can’t Fix the Problem Until We Fix MFA
Here at 1Kosmos, It’s been an action-packed September full of events, analyst mentions, awards and more. One of these exciting events was an Innovation Festival in the Philippines hosted by our cus...
Reflections from UnionDigital Innovation Festival
Why Implement Biometric MFA?
We are all aware of the risks associated with password-based authentication. The proof is in the seemingly endless list of password-based breaches that we see in the n...
Biometric Based MFA for Zero Trust
It's been a very exciting summer for the team here at 1Kosmos. Analysts are taking notice! We are honored to be recognized as an overall leader in the KuppingerCole Leadership Compass Providers of ...
1Kosmos Recognized as a Leader in KuppingerCole Providers of Verified Identity 2022
1Kosmos had the pleasure of attending the Gartner IAM Summit 2022 in Las Vegas. It was our first time exhibiting and sponsoring the event. I have to say it was great to see long time friends, forme...
Gartner IAM Thoughts and Observations
Recently, I came across an article titled “No easy fix for ID verification for government benefits” that explored a major challenge that governments have been facing for the past few years. This pr...
Is There Really No Easy Fix for ID Verification for Government Benefits?
We are excited to share that 1Kosmos has been mentioned in 5 recent Gartner® Hype Cycle™ reports:
Hype Cycle for Privacy 2022
Hype Cycle for Digital Government Services, 2022
Hype Cyc...
1Kosmos Mentioned in 5 Recent Gartner® Hype Cycle™ Reports
Synthetic identities can easily be mistaken for real identities and can wreak havoc on companies that fall victim. So how can you differentiate between the two?
What is synthetic identity theft?...
What Is Synthetic Identity Theft? New Path For Fraud?
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos COO, Huzefa Olia, discuss best practices for fixing multifactor authentication.
https://player.vimeo.com/video/745520635
Michael Cicho...
Vlog: MFA Tried to Fix Passwords but How do we Fix MFA?
Brute force attacks are systematic attacks that continue to attack your logins until they find the correct login information. How can you protect against this?
What is a brute force attack? A br...
What Is a Brute Force Attack & How Do You Prevent Them?
CEO fraud attacks can destroy a company's financial and reputational future but are there any ways to protect against these attacks?
What is CEO fraud? CEO fraud, also called executive or whale...
What is CEO Fraud? – Attacks & How to Prevent Them
Access control is a security measure that can prevent unauthorized access to sensitive information. But how can mandatory access control help with security?
What is mandatory access control? Man...
What Is Mandatory Access Control (MAC)?
Strong Customer Authentication works to protect European users when accessing sensitive financial information, but your company may also need it for compliance.
What is strong customer authentic...
What is Strong Customer Authentication (SCA) & PSD2?
In this vlog, our Chief Operating Officer, Huzefa Olia, joins our Chief Marketing Officer, Michael Cichon, to discuss why Okta needs an identity layer.
https://player.vimeo.com/video/740777974
...
Vlog: Why Okta Needs an Identity Layer
With so many login attacks out there, it's hard to keep track of them all, but credential stuffing is on the rise and is important to be able to recognize.
What is credential stuffing? Credentia...
What Is a Credential Stuffing Attack?
Driver’s licenses were one of the top three most breached data attributes in 2021, according to the Identity Theft Resource Center (ITRC). To make matters worse, many driver’s licenses are counterf...
Achieve a Higher Level of Identity Assurance with BlockID’s AAMVA Integration
I recently stumbled upon an article titled “Travelers Wants Out of Contract With Insured That Allegedly Misrepresented MFA Use” and I was immediately intrigued. Since I work at an organization that...
Cyber Insurance and MFA
CIP and KYC are vital procedures and guidelines to help keep customer data secure while also verifying a customer's identity.
What is KYC CIP? Know your customer and customer identification proc...