Clone phishing is a dangerous attack that can easily make it into any of your employees' inboxes. So what can you do to protect against it?
What is clone phishing? Clone phishing is a type of ph...
Today (June 28, 0222), the FBI issued a warning stating that scammers may be trying to score jobs at companies to access customer or financial data, corporate IT databases, and/or proprietary infor...
FBI Issues Warning – Deepfakes and Stolen PII Utilized to Apply for Remote Work Positions
SIM binding is growing in popularity due to the ease of use and the greater amount of security provided compared to PIN code verification.
What is SIM binding? SIM binding is a type of device bi...
What Is SIM binding? [How to Prevent Online Fraud]
The 2022 Verizon Data Breach report found that a staggering 82% of breaches this year were caused by the human element which encompasses errors, misuse, and social engineering. The report also foun...
How Does 1Kosmos Augment Zscaler?
SOC 2 compliance should be at the top of the list for all technology services, software-as-a-service organizations, and service providers managing or storing customer data in the cloud.
What is ...
What Is SOC 2 Compliance & Certification?
The Way Things Used to Be
During the pandemic, life and work changed rapidly. Appointments needed to be conducted remotely, which resulted in some employees never even meeting each other in person...
Reflections from 1Kosmos All Hands Meeting in India
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon, to discuss FIDO's May 5th announcement and what it means for the future of pa...
Vlog: FIDO and the Future of Passwordless
In this vlog, our Chief Strategy Officer and Co-Founder, Mike Engle, joins our Chief Marketing Officer, Michael Cichon to discuss how a zero trust architecture can be defeated. They also discuss ho...
Vlog: How to Defeat a Zero Trust Architecture
This week, Verizon released its DBIR report marking 15 years of the annual report. In the report, Verizon highlighted their analysis of more than 5,212 breaches and 23,896 security incidents to fin...
Verizon 2022 Data Breach Investigations Report
Why Implement Biometric MFA?
We are all aware of the risks associated with password-based authentication. The proof is in the seemingly endless list of password-based breaches that we see in the n...
What Does Identity Really Mean in Zero Trust
The road to zero trust can be bumpy for nearly any organization. While CISOs need to make data and services accessible to their users, they also need to protect the same data and services in order ...
How to Defeat a Zero Trust Architecture
Business email compromise is one of the many types of phishing attacks targeting both large and small corporations for financial gain.
What is a BEC attack? A BEC attack is a type of phishing sc...
BEC Attacks: What Is Business Email Compromise?
In my last blog post, I started discussing the implications of identity verification and facial recognition where organizations didn’t consider components of a zero trust architecture. Specifically...
How to Reform the Delivery of Government Services via Internet Pt 2
The move to biometric authentication started as far back as 2004 when IBM introduced fingerprint readers. Biometrics went mainstream when Apple released TouchID on the iPhone in 2013.
Since then...
How to Reform the Delivery of Government Services via Internet Pt 1
Identity providers are a seamless way to authenticate your users and also maintain security on your enterprise network.
What is an identity provider? An identity provider is a service that verif...
What Is an Identity Provider? Benefits of IdPs
When great minds and visionary leaders come together, good things can happen. Better yet, when they come together with a shared interest to solve a challenge and bring along specialized teams with ...
AuthenticID and 1Kosmos: A Shared Vision to Unify Identity Proofing and Authentication
Passwordless authentication is becoming a hot topic in the identity verification field as capabilities are becoming more and more sophisticated. To eliminate passwords the market has shifted to aut...
Why Device Level Biometrics Do Not Equate to Identity
In this video blog, our CTO, Rohan Pinto, joins our CMO, Michael Cichon, to discuss why architecture matters for security and privacy in citizen ID.
https://player.vimeo.com/video/706244577
W...
Why Architecture Matters for Security and Privacy in Citizen ID
Strong authentication can be the difference between hackers easily slipping into your network and stealing your data or being able to block them from the start.
What is strong authentication? St...
What Is Strong Authentication? (With Examples & Methods)
In this vlog, our CSO, Michael Engle, joins our CMO, Michael Cichon, to discuss how to extend Windows Hello in your journey to passwordless. If you are interested in learning more, please register ...
How to Extend Windows Hello in Your Journey to Passwordless
Self-sovereign identities are the future of digital identities. Putting the control back into the hands of the users allows for greater security everywhere.
What is self-sovereign identity? Self...
What Is Self-Sovereign Identity? (The Future of ID?)
Distributed digital identity, decentralized identity, blockchain, and distributed ledgers: what do they mean and how can they help keep my company secure?
What is a digital identity? A digital i...
What Is Distributed Identity? How Decentralized ID Works
Passwords are a problem… we all know it. It’s all over our website and countless others. Vendors are trying to help organizations to course correct to solve the problem. Microsoft’s Windows Hello f...
6 Technology Gaps to Consider When Implementing Windows Hello For Business
Karla interviews Hemen Vimadalal, CEO at 1Kosmos and an investor in a number of cybersecurity businesses. Hemen talks about his experience with identity theft and how that has driven him to create ...