Identity providers are a seamless way to authenticate your users and also maintain security on your enterprise network.
What is an identity provider? An identity provider is a service that verif...
When great minds and visionary leaders come together, good things can happen. Better yet, when they come together with a shared interest to solve a challenge and bring along specialized teams with ...
AuthenticID and 1Kosmos: A Shared Vision to Unify Identity Proofing and Authentication
Passwordless authentication is becoming a hot topic in the identity verification field as capabilities are becoming more and more sophisticated. To eliminate passwords the market has shifted to aut...
Why Device Level Biometrics Do Not Equate to Identity
In this video blog, our CTO, Rohan Pinto, joins our CMO, Michael Cichon, to discuss why architecture matters for security and privacy in citizen ID.
https://player.vimeo.com/video/706244577
W...
Why Architecture Matters for Security and Privacy in Citizen ID
Strong authentication can be the difference between hackers easily slipping into your network and stealing your data or being able to block them from the start.
What is strong authentication? St...
What Is Strong Authentication? (With Examples & Methods)
In this vlog, our CSO, Michael Engle, joins our CMO, Michael Cichon, to discuss how to extend Windows Hello in your journey to passwordless. If you are interested in learning more, please register ...
How to Extend Windows Hello in Your Journey to Passwordless
Self-sovereign identities are the future of digital identities. Putting the control back into the hands of the users allows for greater security everywhere.
What is self-sovereign identity? Self...
What Is Self-Sovereign Identity? (The Future of ID?)
Distributed digital identity, decentralized identity, blockchain, and distributed ledgers: what do they mean and how can they help keep my company secure?
What is a digital identity? A digital i...
What Is Distributed Identity? How Decentralized ID Works
Passwords are a problem… we all know it. It’s all over our website and countless others. Vendors are trying to help organizations to course correct to solve the problem. Microsoft’s Windows Hello f...
6 Technology Gaps to Consider When Implementing Windows Hello For Business
Karla interviews Hemen Vimadalal, CEO at 1Kosmos and an investor in a number of cybersecurity businesses. Hemen talks about his experience with identity theft and how that has driven him to create ...
1Kosmos CEO Hemen Vimadalal Podcast Interview with Karla Reffold
Phishing is costing companies billions of dollars but executive phishing can make these attacks more costly because of who the attackers are spoofing.
What is executive phishing? Executive phish...
What Is Executive Phishing? (How to Protect Against Whaling)
Online document verification has become a useful tool in the current environment of remote onboarding; it eliminates the need for in-person verification.
What is the document verification proces...
Online Document Verification: How Does It Work?
Email phishing can be tricky to spot, cost your company thousands of dollars, and tarnish your reputation, so how can you protect against these attacks?
What Is Email Phishing?
Email phishing is ...
What Is Email Phishing? (& How to Prevent It)
When news of the Lapsus$ breach at Okta surfaced a few days ago it initially seemed of little consequence. The explanation that a 3rd party contractor with limited access had been compromised seeme...
The Lapsus$ Breach at Okta and Why Single Sign On Needs an Identity Layer
In this vlog, 1Kosmos COO, Huzefa Olia, and CMO, Michael Cichon, discuss why government agencies like the Cybersecurity and Infrastructure Security Agency have been encouraging MFA. They explore th...
Vlog: Advanced Biometrics for MFA
In June 2021, the European Commission proposed an update to its pan-European digital identity framework, which will give every European a set of digital identity credentials that will be recognized...
What Is eIDAS 2.0?
Biometrics may sound like a new type of technology, but it has actually been around for decades and for a good reason—biometrics are hard to hack.
Why are biometrics used for security? Biometric...
Using Biometrics in Security: Pros & Cons
A one-time password can be used for many authentication needs including securing private information or creating an alternative to a password reset.
What is a One-Time Password?
A one-time passwo...
What Is a One-Time Password & When Is It Used?
Whale phishing attacks can deplete an organization of millions and destroy reputations. Is your company protected from these attacks?
What is whale phishing? Whale phishing is a spear phishing a...
Whale Phishing: What Is a Whaling Attack?
FIDO2 authentication goes beyond simply being an extension of FIDO or the FIDO alliance and adds in new protocols for passwordless authentication.
What does FIDO2 stand for? FIDO2 stands for Fas...
FIDO2 Authentication vs. FIDO: What’s the Difference?
Enable MFA!
CISA Director, Jen Easterly posted a video about how to enable MFA across all of your accounts. It's important to do as it ensures organizational security. But not all MFA is created e...
Advanced Biometrics Based Multi-Factor Authentication
Online identity verification solutions are fast and easy to verify someone's ID without requiring documents to be supplied in person.
What is online identity verification? Online identity verifi...
How Online Identity Verification Works
In my last blog post, I started discussing the implications of identity verification and facial recognition where organizations didn’t consider components of a zero trust architecture. Specifically...
The Advantages and Implications of Using Facial Recognition for Identity Verification Pt 2
The move to biometric authentication started as far back as 2004 when IBM introduced fingerprint readers. Biometrics went mainstream when Apple released TouchID on the iPhone in 2013.
Since then...