Using MFA is a great starting point, but you'll want to know multi-factor authentication best practices to get the most out of your MFA solution.
What are the four factors of multi-factor authen...
Yesterday (February 9, 2022) the FBI issued a warning to inform the American public and mobile carriers about the increasing threat of SIM (Subscriber Identity Module) swapping. In 2020, criminals ...
FBI SIM Swapping Warning Issued
We hope to create the ultimate expression of a developer experience for passwordless authentication and identity proofing. The roles and responsibilities of developers have continued to expand in t...
1Kosmos Developer Experience
Ransomware has been increasing significantly. India is now amongst the top five targeted countries in the APAC region. 49% of organizations in India suffered multiple ransomware attacks in the past...
Ransomware in India
There is a classic juxtaposition within security controls. Organizations need to make data and services available, but if it’s too easily accessible, too open, then a data breach can occur. On the ...
Zero Trust and Customer Experience
In my last blog post I talked about the fundamental shift from implied trust to verified identities at login. I could continue on this path and talk about how the security world revolves around ide...
The Role of Identity in Access Management and Web 3.0 Part 2
When 1Kosmos came into being, the founders focused on a mission to provide individuals with a secure digital identity that gives them control of their credentials and enables service providers to u...
The Role of Identity in Access Management and Web 3.0
In 2010, Forrester analyst John Kindervag coined the term “Zero Trust” in his research – emphasizing that all network traffic is untrusted and that any request to access any resource must be done s...