Part 2
In part 1, I provided some needed context for moving from passwords to identity for user authentication. Now, let’s take a deeper look, and we’ll start with identity in the offline world....
Part 1
There seems to come a point in time when all industries hit an inflection point - where the old ways of doing things cede to the new.
We’ve reached this point in Identity and access ma...
Identity Based Authentication – The Transformation of IAM
Today we relaunched the 1Kosmos brand at a time when both business and government leaders are demanding improved security against cyber threats while international gangs feast on ransomware, data b...
1Kosmos Relaunch: How 1Kosmos Protects Identity from Attack
1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss a variety of topics including ransomware and executive orders in their recent vlog.
Michael Cichon:
Hey Mike. Quite a day, huh?
Mike...
Vlog: Pipelines, Executive Orders, and More with Mike Engle
IAM helps manage authorization and authentication to company resources which not only adds more security but also creates a better user experience.
What is IAM? IAM is Identity and Access Manage...
What Is IAM? (Why Is It Important?)
1Kosmos CRO, Kevin Brown, and CMO, Michael Cichon, introduce the passwordless identity package by 1Kosmos.
Michael Cichon:
All right. Good morning. Kevin Brown, 1Kosmos' chief revenue officer. ...
The Passwordless Identity Package Vlog
Credential Compromises: An Identity Management Crisis
Identity management compromises were the culprits of several recent high profile cyber attacks. In fact, the Colonial Pipeline, SolarWinds, ...
The Passwordless Identity Package: Fast and Fraud Free
Colonial Pipeline Attack: An Identity Management Nightmare
You’ve probably seen the latest authentication and identity management nightmare sweeping the US: the Colonial Pipeline attack. In case...